- TechJourney Newsletter
- Posts
- Week of Infosec
Week of Infosec
The 5th edition of the Newsletter
Hi everyone,
and welcome to the 1st edition of my newsletter in 2023 😊
Today it will be compilations of the week's achievements and findings
This week was productive:
I prepared 3 threads on Twitter about cybersecurity basics:
The first one is about the comparison of 3 ways to transform/encode data that are used regularly in Cybersecurity and Software Engineering: Encryption, Hashing, and Encoding.
Each one has its own role and should not be mixed up
Encryption vs Hashing vs Encoding
Encryption is the process of converting data into a non-readable form
Only users that know a secret can decrypt and read it.
Encryption ensures data confidentiality and with certain algorithms also data integrity
— Alex (@alexikonor)
7:24 PM • Jan 4, 2023
The second one was about one of the critical types of vulnerabilities a potential attacker may exploit in the product: Remote Code Execution
Wondering what is RCE?
RCE stands for Remote Code Execution
RCE is one of the most critical security vulnerabilities
It is a security flaw in software or hardware product that allows a potential attacker to execute commands on a vulnerable machine REMOTELY
— Alex (@alexikonor)
8:10 PM • Jan 5, 2023
and the third one continues the previous and extends with more details on how the attacker can operate the exploited system from his remote machine, with a basic example:
Continuing the previous thread about RCE
You might be wondering how the attacker will run commands on my remote system.
REVERSE SHELL
— Alex (@alexikonor)
3:23 PM • Jan 6, 2023
BTW here is a great cheat sheet of reverse shells examples in different languages:
and I passed the "Design the CPU" course :
I started it right after I finished reading "But How Do It Know? - The Basic Principles of Computers for Everyone", the course is based on this book, so you can implement everything from the book yourself with logisim tool. If you want to know how a computer works this course is a good choice.
also the other day I came across excellent courses about binary exploitation and would like to share them with you:
and some additional about heap exploitation:
during my pentesting projects, I've never faced binary exploitation but anyway these topics might be handy and it's better to be prepared
Great post by Ankur, made me think about it ...
My writing is now making $2,500/month in revenue.
- I have 5K+ subscribers.
- I get 2-3 inbound leads every week.Past: I published 100+ average posts.
Now: I publish 2-3 new quality blog posts every month.Start a Blog in 2023; It's truly an amazing side income opportunity.
— Ankur💻🎧💪 (@TheAnkurTyagi)
12:08 PM • Jan 7, 2023
Writing a Blog for developers opens new opportunities besides additional side income you can possibly enhance your networks with other great people
BTW some tech companies pay for tech posts 👇
If you are new to cybersecurity take a look at the video below, it gives some base on how to implement your own learning plan to get into security:
a bit about one of the greatest discoveries of humanity:
That is all for today, thank you for your attention,
Alex




