Hello and welcome! I joined the Lemmy fediverse a week ago, and settled in to the sh.itjust.works instance yesterday. I had pulled back from most of my social and general use of Reddit a few years back, and mostly just used it as a more social RSS feed to keep abreast of things going on in the cybersecurity and information security world. One of the first things I noticed when exploring the Lemmy Fediverse was that outside of the general tech communities, there was only a single cybersecurity community which hadn’t seen any activity in over a year or more.

I’ve gone back to my old stalwart RSS feeds, so I decided to create this community and post any articles I find interesting that come across my feed. Hopefully others will find it helpful as well!

I really hope that the social aspect of the community will take hold here too, and encourage anyone to make any link or text posts related to cybersecurity that they want. I don’t really want this to turn into a place where every other question is “How do I get into cybersecurity?” or “Will you be my mentor?”, but the Lemmy community is small so at this point I’d welcome any sort of community interaction.

To kick things off with a little about myself, started my career working as a network engineer for a WISP, scampering across city roofs, throwing up non-pen mounts for PtP radios, and slinging multi-Gbps links from building to building. I slowly transitioned into a SOC through a few calculated job transitions, then after a few more I’ve found myself working on a team that splits our time providing penetration tests for internal business lines and running red team/adversary emulation engagements against my company. Over the past few years I’ve earned my OSCP, OSEP, and OSWE, along with a handful of GIAC certifications. I’m currently working on the study materials for the OSED. I don’t have any coding experience, just a bit of scripting ability, but I am very excited to jump in to binary exploitation and reverse engineering. It’s the closest thing to magic to me in this space, and I can’t wait to deconstruct and demystify it a bit.

Thanks for reading, and glad you’re here!

  • borariOP
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    I’ve messed with binary exploitation a bit, just to the level of basic buffer overflows that the PEN-200/OSCP go in to. That exposure piqued my curiosity, but learning more lower-level stuff like using Windows APIs directly in C# with P/Invoke to do Process Injection/Migration and AV evasion really fueled my desire to keep digging until I hit I point where things are just too advanced for me to understand.

    Reverse engineering is super frustrating for me, but very rewarding when you finally get it figured out.

    Yeah, that dopamine hit when you finally figure out the thing you’re struggling with is what hooked me, and it hooked me hard.