techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#windowsinternals

0 posts0 participants0 posts today
Max Renke<p>Day 1 of posting to social media until I get an offensive security research job</p><p>First, I’m going to start with what I know – Windows. I need to recreate what I had access to at Microsoft, so that starts by setting up a dev environment and finding a copy of Windows System Internals, perhaps the greatest resource for learning Windows out there. My expertise is in Windows and virtualization, so I’m going to make sure I master those areas.</p><p>Next, I don’t think I want to grind coding exercises, but I do need to shake the rust off my coding skills. I think I’m going to start with some HackTheBox challenges and find some CTFs to participate in.<br> <br>Finally, my long overdue goal: learn Rust. I’m not sure if this will help immediately, as I could choose to improve my knowledge of Python. But Rust was getting more and more popular in the areas of Windows I was tasked with protecting, so I need to learn what all the fuss is about with regards to memory safety.<br> <br>If anyone is on a similar journey, let’s hold each other accountable in the comments! I will be sure to document any write-ups at blog.maxrenke.com (work in progress).</p><p><a href="https://infosec.exchange/tags/OffensiveSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffensiveSecurity</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/WindowsInternals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsInternals</span></a> <a href="https://infosec.exchange/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackTheBox</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlueTeam</span></a> <a href="https://infosec.exchange/tags/RustLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RustLang</span></a> <a href="https://infosec.exchange/tags/PythonProgramming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PythonProgramming</span></a> <a href="https://infosec.exchange/tags/DevEnvironment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevEnvironment</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberCareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCareer</span></a> <a href="https://infosec.exchange/tags/SecurityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityResearch</span></a> <a href="https://infosec.exchange/tags/MemorySafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MemorySafety</span></a> <a href="https://infosec.exchange/tags/CyberCommunity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCommunity</span></a> <a href="https://infosec.exchange/tags/JobSearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JobSearch</span></a> <a href="https://infosec.exchange/tags/TechJourney" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechJourney</span></a> <a href="https://infosec.exchange/tags/SecurityEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityEngineering</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/LearningEveryDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LearningEveryDay</span></a></p>
Alexandre Borges<p>(good reading) Introducing Early Cascade Injection: From Windows Process Creation to Stealthy Injection:</p><p><a href="https://www.outflank.nl/blog/2024/10/15/introducing-early-cascade-injection-from-windows-process-creation-to-stealthy-injection/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">outflank.nl/blog/2024/10/15/in</span><span class="invisible">troducing-early-cascade-injection-from-windows-process-creation-to-stealthy-injection/</span></a></p><p><a href="https://mastodon.social/tags/codeinject" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>codeinject</span></a> <a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://mastodon.social/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsinternals</span></a> <a href="https://mastodon.social/tags/cprogramming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cprogramming</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Alexandre Borges<p>(good reading) Introducing Early Cascade Injection: From Windows Process Creation to Stealthy Injection:</p><p><a href="https://www.outflank.nl/blog/2024/10/15/introducing-early-cascade-injection-from-windows-process-creation-to-stealthy-injection/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">outflank.nl/blog/2024/10/15/in</span><span class="invisible">troducing-early-cascade-injection-from-windows-process-creation-to-stealthy-injection/</span></a></p><p><a href="https://infosec.exchange/tags/codeinject" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>codeinject</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://infosec.exchange/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsinternals</span></a> <a href="https://infosec.exchange/tags/cprogramming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cprogramming</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Rishu Ranjan<p>Windows Internals Basics: Understanding the Inner Workings of the Operating System</p><p>Windows internals is a fascinating field of study that delves into the inner workings of the Windows operating system. It encompasses various components such as the kernel, device drivers, processes, threads, memory management, and file systems. By understanding these fundamental concepts, you can gain insights into how Windows manages resources, handles hardware interactions, and executes user applications.</p><p>Full Read - <a href="https://www.knowcybersec.today/2024/03/windows-internals-basics-understanding.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">knowcybersec.today/2024/03/win</span><span class="invisible">dows-internals-basics-understanding.html</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsinternals</span></a> <a href="https://infosec.exchange/tags/basics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>basics</span></a> <a href="https://infosec.exchange/tags/windowssecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowssecurity</span></a></p>
pill.<p>Do anyone have recommendation to learn about <a href="https://infosec.exchange/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsinternals</span></a> ?</p>
0xberserkr<p>Windows Internals - I have just completed this room! Check it out: <a href="https://tryhackme.com/room/windowsinternals" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tryhackme.com/room/windowsinte</span><span class="invisible">rnals</span></a> <a href="https://infosec.exchange/tags/tryhackme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tryhackme</span></a> <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://infosec.exchange/tags/Processes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Processes</span></a> <a href="https://infosec.exchange/tags/Threads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Threads</span></a> <a href="https://infosec.exchange/tags/PEFormat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PEFormat</span></a> <a href="https://infosec.exchange/tags/DLL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DLL</span></a> <a href="https://infosec.exchange/tags/WindowsAPI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsAPI</span></a> <a href="https://infosec.exchange/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsinternals</span></a> via <span class="h-card" translate="no"><a href="https://infosec.exchange/@RealTryHackMe" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>RealTryHackMe</span></a></span></p>
Graham Sutherland / Polynomial<p>I wrote a thing for work! Microsoft are introducing a new type confusion bug class mitigation called CastGuard, as part of the MSVC++ compiler.</p><p>Right now it's still undocumented &amp; unreleased. I stumbled across it by accident while looking at the Load Configuration directory in PE files, and ended up going down a deep rabbit hole of reverse engineering the entire feature and discovering all the hidden compiler flags and language keywords</p><p><a href="https://labs.nettitude.com/blog/preventing-type-confusion-with-castguard/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">labs.nettitude.com/blog/preven</span><span class="invisible">ting-type-confusion-with-castguard/</span></a></p><p><a href="https://chaos.social/tags/cpp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cpp</span></a> <a href="https://chaos.social/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsinternals</span></a> <a href="https://chaos.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Tedi Heriyanto<p>Windows API Function Cheatsheets: <a href="https://github.com/snowcra5h/windows-api-function-cheatsheets" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/snowcra5h/windows-a</span><span class="invisible">pi-function-cheatsheets</span></a></p><p><a href="https://infosec.exchange/tags/windowsapi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsapi</span></a> <a href="https://infosec.exchange/tags/cheatsheet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cheatsheet</span></a> <a href="https://infosec.exchange/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsinternals</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a></p>
log4jm<p>Some of my holiday presents to start my 2023 <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/books" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>books</span></a> reading list:</p><p>1) "Tracers in the Dark" by <span class="h-card"><a href="https://infosec.exchange/@agreenberg" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>agreenberg</span></a></span> who along with <span class="h-card"><a href="https://infosec.exchange/@kimzetter" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>kimzetter</span></a></span> and <span class="h-card"><a href="https://infosec.exchange/@NicoleP" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>NicoleP</span></a></span> is in my top 3 favorite writers in cyber</p><p>2) "The Art of Attack" by Maxie Reynolds</p><p>3) "The Art of Cyberwarfare" by Jon DiMaggio</p><p>all sitting atop my laptop, which is filled with eBooks I've bought over the last year. On there my goals for 2023 is to start/finish:</p><p>4) <a href="https://infosec.exchange/tags/WindowsInternals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsInternals</span></a> 🤓</p><p>5) the incredible <span class="h-card"><a href="https://infosec.exchange/@alyssam_infosec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>alyssam_infosec</span></a></span>'s "Cybersecurity Career Guide", which is actually where I'm going to start since I've got interviews for an InfoSec role in 2 weeks.</p><p>What are you reading in 2023? <a href="https://infosec.exchange/tags/HappyNewYear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HappyNewYear</span></a></p>
nt!PopGetDope :coolcat:<p>:twitter:​ finally seems to be flat-lining, trying out this new mastodon thing...</p><p><a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>introduction</span></a>, for peeps I've not met prior via my bird app handle <span class="h-card"><a href="https://infosec.exchange/@ntpopgetdope" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ntpopgetdope</span></a></span>. I'm a vulnerability researcher that's worked in the industry professionally for &gt;4yrs</p><p>My background stems from an obsession with <a href="https://infosec.exchange/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsinternals</span></a> &amp; the vastly underrated 'HAL.dll'. These days I'm into baseband vuln research working on obscure hardware, architectures &amp; attacks. Love chatting about all things:<br><a href="https://infosec.exchange/tags/fpga" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fpga</span></a> <a href="https://infosec.exchange/tags/uefi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uefi</span></a> <a href="https://infosec.exchange/tags/baseband" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>baseband</span></a> <a href="https://infosec.exchange/tags/faultinjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>faultinjection</span></a> <a href="https://infosec.exchange/tags/openhardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openhardware</span></a> <a href="https://infosec.exchange/tags/embeddedelectronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>embeddedelectronics</span></a> <a href="https://infosec.exchange/tags/pcbdesign" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcbdesign</span></a> and <a href="https://infosec.exchange/tags/cats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cats</span></a> !</p><p>Currently with the @InterruptLabs crew, a boutique vulnerability research &amp; exploit development firm in the UK.</p>