: Day2 : Tuned in to @Alh4zr3d@twitter's twitch (twitch.tv/alh4zr3d). He streamed pwning the Tricky box. Watched @mttaggart's _Practical Webapp Security and Testing_ (academy.tcm-sec.com) (henceforth, PWST), sections 4-6 and 4-7. Need to spend some more time on 4-7 and the javascript trickiness.

@scottlink how did you like the Webapp Sec & Testing?

I've been continually finishing Matt's Practical Malware Analysis and Triage since release, but keep pausing it to read literature about different aspects of the subject matter. I like the PMAT course a lot.

Follow

@__p__e__t__e__ So far, so good. Some stuff I've seen before. I really appreciate the labs. Between this and 'Hacking APIs', by Corey Ball, I've had to get more familiar and more comfortable with Docker. That's been useful. I'm looking forward to the capstone. Gotta find an app (off vulnhub, for example), hack it, and write a report. Little primer before going after the OSWE, I reckon.

@scottlink most of my docker labbing has been on a raspberry pi, but there are containers for BuggyWebApp (BWapp) and Damn Vulnerable Web App (DVWA) for x86_64. I think I got the acronyms right. So depending on your system's architecture you could spin one of those up really quickly.

@__p__e__t__e__ Indeed. I've got an older Intel NUC I've put to work hosting them. I've got another to bring back up on line and then I plan to look harder a k8s. Wonder what kind of stuff I can learn w/DVWA or JuiceShop on top of Kubegoat. There's _always_ something to learn! (I need to start looking for deliberately vuln IdP. See what that looks like.)

@scottlink cant believe I forgot JuiceShop! They even have a easter egg in there!

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.