Skip to content
@SNUC-Zero-Day

Zero Day

Edita's-Zero-Day (ノ◕ヮ◕)ノ*:・゚✧

👾 Welcome Aboard Hackers !!! 👾

Full_Logo

Inspiration: Offensive Security

Introduction ヽ(・ω・)ノ

SNU Red Force is an Organization or a Team of Offensive Security Enthusiasts who are willing to participate and learn Reverse Engineering, Exploit Development, Social Engineering and Activities relating to OffSec.

Reverse Engineering : Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accomplishes a task with very little (if any) insight into exactly how it does so. (Source: Wikipedia)

Exploit Development : Exploit development is essentially the act of finding vulnerabilities in software and applications and establishing how they can be used to overtake a targeted system. (Source: Hallborn)

Social Engineering : Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. (Source: Kaspersky)

Prerequisites

The Threshold is set Pretty High. One should have an Advanced/Intermediate Knowledge in these Topics. Since Cybersecurity is a Vast Field, the requirements to enter the field is also pretty vast. Hence, getting over this in the initial phase is better than getting stuck in the middle.

  1. GNU/Linux
  2. Low | Middle | High-Level Languages
  3. Networking
  4. Git | Github | Gitlab | Git Kraken

| = OR

GNU/Linux : When I am referring to Linux I am referring to the Kernel and not the OS (Refer Wiki for the Kernel Definition). Linux is an Integral Part in Offsec. Linux is Open Source which means it is being patched every single second by Developers. Linux is free of Spywares and promotes freedom. This ultimately led to the development of Exploits which are only usable in Linux. There are Various Pentesting Distributions out there.

  1. Kali Linux
  2. Parrot OS
  3. Black Arch
  4. BackBox
  5. Red Hat OS

You can even develop your Own Pentesting Distribution from scratch and Rice it. It's all about being Comfy with your Environment.

Low | Middle | High-Level Languages : Programming Languages play an important role in Exploit Development and Reverse Engineering. Ofcourse you can do Penetration Testing without typing in a Single Line of Code but knowing a Couple of Languages will help you in the Long Run. Some Languages Recommended by Specialists are:

  1. Assembly Language : There are Many Types of Assembly Languages out there. The Most Common Ones are X86_64 and ARM. Learning Assembly Language is too much burden. So it'd be nice if you atleast know how an Assembly Code Works.
  2. C : The Mother of All Languages. C is referred to as a Middle Level Language. It let's you do everything.. Literally Everything !!! C is used in the Field of Exploit Development due to it's Custom Memory Management Feature and Supposedly Low-Level Nature. It'd be fabulous if you Master C/C++
  3. C++ : Bloat
  4. Python: For Developing Automated Scripts and Exploits

Networking: It is essential for Cyber Security Professionals to have a solid understanding of how computers communicate. There is much more happening behind the scenes of computer networks than what can be observed when using applications. (Source: W3Schools Shucks!!!) You should have an INDEPTH understanding of Networking. Since, Hacking is all about exploiting Networks and Gaining Access and Elevating your Previleges after Gaining Access. Then comes Payload Insertion and Other Malicious Stuffs.

Git && Github | Gitlab | Optional: Git Kraken : Git is a free and open-source distributed version control system. It was created by Linus Torvalds in 2005. You can find Git to download at git-scm.com and they also have great resources for documentation. Github is a cloud-based hosting service for Git repositories. It is a tool build on the top of Git. In simple terms, it provides a graphical interface that interacts with Git repositories. It makes it easier for the individual and team to use Git for version control and provide collaboration features such as task management, bug tracking and feature request for every project. You can use Github through a web portal or desktop GUI or Git shell. (Source: https://medium.com/swlh/things-about-git-and-github-you-need-to-know-as-developer-907baa0bed79)

Contributing

Contributing requires you to Satisfy all the Necessary Prerequisites and to be part of the Core Team

Ping https://github.com/vismbs to get yourself Approved. You will receive an Invitation Email asking you to be the Member of the Organization.

Conclusion

SNU Red Force aims to be the Greatest in the whole of SNU/SSN in terms of Cybersecurity and the Members of the Organization will undergo Extensive Training to statisfy the Needs of the Organization which will shape them into a better Pentester. We'll Participate in CTFs, Bug Bountry Programme and Etcetera.

Author: https://github.com/vismbs --> Touch Some Grass 🌿 and Hack Some Computers 🖥️

PS: IDK What happened to Mentioning Author's Profile. Bear with the Ridiculous Profile Link

Pinned

  1. Resources Resources Public

    These are OS and Resources which can be used to learn Networking, Linux Fundamentals and all other Essentials to participate and contribute to this Communtity

    2

Repositories

Showing 3 of 3 repositories
  • .github Public

    An Introductory Repository for SNU Red Team. This Repository outlines the Prerequisites and Skills needed to join.

    0 MIT 0 0 0 Updated Dec 31, 2023
  • bonkcron Public

    Bonkcron is a simple tool to anonymously flood websites vulnerable to wp-cron with proxies.

    JavaScript 0 MIT 0 0 0 Updated Aug 22, 2023
  • Resources Public

    These are OS and Resources which can be used to learn Networking, Linux Fundamentals and all other Essentials to participate and contribute to this Communtity

    2 MIT 0 0 0 Updated Nov 28, 2022

Top languages

Loading…

Most used topics

Loading…