Introduction
Having this idea of giving back to the community, I have decided to write a resource for individuals of all skill levels to be able to learn something new in the world of cyber security. I have participated in many events helping to build CTF challenges as well as running workshops for all skill levels, but mainly concentrated towards beginners and thought that I would put together something to help teach others.
This book will be written through the lens of my personal experiences and what I have observed. At the starting of writing this book-like resource, I have only been exposed to security and its fundaments for just over a year - which is technically not really that long. Despite this, I feel that I have learnt so much and that there is no better time to write this than now, given that that I will be able to write a more beginner friendly resource for those who are new to this field.
Whilst, the initial chapters are mainly for beginners there will be plenty to learn for the advanced where I will talk more elaborately into the tricks and tools I have picked up along the way. Enjoy the read and feel free to message me anytime to give feedback or discuss any topics.
Whoami
I’m Nicholas, just a typical security/programming/technology enthusiast who wants to help those starting off in their security journey. Starting off, I had realised that there is such a strong community towards intermediate to advanced individuals where beginners are really just left behind. In an attempt to bridge the gap (as well as strengthen my own understanding), I have created this resource to help those interested in entering the world of cyber security, or those who simply want to learn stuff they may have missed.
Prerequisites
Due to the ‘beginner friendly’ nature of this book, there will no prior knowledge required as it will begin from the basics. Despite this, you may need to do some extra reading for some sections to make sense in areas where some programming is required.
It is recommended to have some basic knowledge of a programming language, where concepts can be tranferrable. Some resources and basic guides will be provided throughout the book.
Using This Resource
This book will go through different tools, content on particular concepts, direction for extra reading, as well as basic to advanced CTF challenges I have created and/or encountered. Take time to do some extra exploring of the tools and getting comfortable with them. There will be some help provided for setting up tools.
If at anytime you get stuck or lost, do some extra searching around and if all attempts have come into vain feel free to send me a message. Don’t give up, it is part of the learning process! I wish you luck conquering this resource and hope that you have a good time!
Ethics
All information within this book is placed under ‘Good Faith’ for purposes of education. Do not, by any means use any techniques on any organisation or individual without their permission as it may lead to a conflict with the law. This resource does not hold any liability for any incorrect information and merely serves as a resource to help grow the security community.