Skip to content

Tracking my progress for 100 days learning something new daily....

Notifications You must be signed in to change notification settings

jaiguptanick/100daysofcyber

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 

Repository files navigation

100daysofcyber

Tracking my progress for 100 days learning something new daily....

Day 1

Revisiting Computer Networks:

  1. Computer Networking Full Course - OSI Model Deep Dive with Real Life Examples
  2. OSI MODEL in easiest Way (best way to remember OSI layers and their role)

--

Read book till pg 20

zseanos methodology

Day 2

  1. Read a good blog on BugBounty Methodology :
  1. Subdomain Takeover: https://github.com/EdOverflow/can-i-take-over-xyz

  2. How to take over a subdomain in Google Cloud DNS

  3. Found a subdomain takeover in a private Bugbounty Program

Day 3

  1. Learing Google Cloud Platform from Youtube: https://www.youtube.com/playlist?list=PLBGx66SQNZ8YWRUw6yicKtD4AIpUl_YiJ

  2. Tried exploiting subdomain takeover but google cloud not assigning the desired namesever shard while creating DNS Zone. Build script to create Zones recursively but it is randomly assigning only -a1 and -b1, But I need ns-cloud-d1.googledomains[.]com.

Day 4

  1. Did recon on a Private Bug Bounty Program.

  2. Read on SSTI from Portswigger Labs

  3. Solved Basic server-side template injection

Day 5

Solved all the server-side template injection (SSTI) labs from Portswigger Web-Security Labs.

Day 6

  1. Did recon on a private program.
  2. Read Book:

Day 7

  1. Completed all the Access control vulnerabilities labs from Portswigger Web-Security Labs.
  2. Read Blog on SSTI: Handlebars template injection and RCE in a Shopify app
  3. Stared working on my BugBounty Recon Tool : Designed Basic Workflow Diagram

Day 8

  1. Read writeup: Delete any Video or Reel on Facebook (11,250$)
  2. Watched the First Half playlist by technical guftgu on CCNA for revisiting networking concepts

Day 9

  1. Solved Portswigger Labs:Authentication Bypass
  2. Read Blogs:

Day 10

  1. Did recon on a bugbounty target.
  2. Read Blogs:

Day 11

  1. Found critical IDOR revealing PII and OTP bypass on a domain
  2. Read blog:

Day 12

Prepared Detailed Report of both the bugs (critical IDOR revealing PII & OTP-bypass) and submitted them.

Read Blog:

Day 13

  1. Read: Guide to Bug Bounty Hunting
  2. Did recon on an domain.

Day 14

  1. Found another IDOR on a domain.
  2. Read Blog: Swagger API

Day 15

  1. Solved CORS labs from Portswigger Web Security Academy

  2. Read blogs

Day 16

  1. Did enumeration on a domain.
  2. Read about Business logic vulnerabilities: http://portswigger.net/web-security/logic-flaws

Day 17

  1. Tried exploiting OTP bypass on a BugBounty program
  2. Solved some of the Business logic vulnerabilities from portswigger labs

Day 18

Read Blogs:

  1. SSRF leading to AWS keys leakage
  2. Bypass Apple’s redirection process with the dot (“.”) character
  3. Cross site leaks
  4. What is Doxing?
  5. $500 in 5 minutes (broken link automation)

Day 19

  1. Did recon on a domain
  2. Read blogs

Day 20

  1. Solved labs of Bussiness logic flaws Portswigger.
  2. Read Blogs:

Day 21

Read Race Conditon Blogs:

Day22

  1. Working on the recon tool.
  2. Read blog:

Day23

  1. Working on the recon tool
  2. Read blogs:

Day24

  1. Solved remaining bussiness logic vulnerability labs from Portswigger Web Security Academy.
  2. Read blog:

Day25

  1. Tested API on an edtech website exposing PII.
  2. Read Blog:

Day26

  1. Revisted notes.
  2. Read blogs:

Day27

  1. Working on the recon tool.
  2. Read blog:

Day28

  1. Completed Udemy Course on "Cybersecurity Incident Handling and Response"

  2. Read blog:

Day29

  1. Read blog:

Day30

  1. Working on Enum Tool.
  2. Read blog:

Day31

  1. Working on Enum Tool. (implemented keylogger and discord webhooks)
  2. Read blog:

Day32

  1. Working on the enum tool: (Implemented screenshot,system info gathering functionality)
  2. Read blog:

Day33

Read Blog:

Day34

  1. Read Guide: zseanos methodology (pg: 20-30)
  2. Read Blog:

Day35

  1. Revisited Notes of Enumerating Various Services in Pentesting
  2. Read Blog:

Day36

  1. Solved tryhackme room:
  • Intro to Offensive Security
  • Web Application Security
  • Intro to Digital Forensics
  1. Read Blog:

Day37

  1. Read about SSRF.
  2. Read Blog:

Day38

  1. Read about SQLi
  2. Read Blogs:

Day39

  1. Read about FTP, SSH, SMTP DNS, and its pentesting.
  2. Wrote Blog:
  1. Read Blog:

Day40

  1. Revisted NFS,RDP,VNC, LDAP,WinRM,mssql,MySQL pentesting.
  2. Read Blog:

Day 41

  1. Revisted Insecure File Uploads.
  2. Tested a webapp.
  3. Read blog:

Day 42

  1. Revisted XSS and javascript.
  2. Read Blogs:

Day 43

  1. Revisited SNMP, SMB, MSRPC pentesting.
  2. Reading Blog:

Day 44

  1. Reading Notes:

Day 45

  1. Solved DOM XSS Labs from Portswigger
  2. Read Blog:

Day 46

  1. Watched networking tutorials (MAC,ARP)
  2. Read blogs:

Day 47

  1. Did recon on a domain.
  2. Read blogs:

Day 48

  1. Did recon on a domain and read about 403 bypass.
  2. Read blogs:

Day 49

  1. Did ssl pinning bypass on Android and learning static analysis.
  2. Read blogs:

Day 50

  1. Revisited Linux Privilege Escalation from Notes
  2. Read blog:

Day 51

  1. Read CORS from Portswigger http://portswigger.net/web-security/cors
  2. Read blog:

Day 52

  1. Solved CORS labs from Portswigger
  2. Read blog:

Day 53

  1. Researched and preparing list of most common interview questions in cybersecurity.
  2. Read blog:

Day 54

  1. Solved box MrRobot on TryHackMe
  2. Read blog:

Day 55

  1. Solved box Eavesdropper on http://tryhackme.com/room/eavesdropper
  2. Read blog:

Day 56

  1. Read blog/video:

Day 57

  1. Revisited Windows Privilege Escalation from Notes.
  2. Read Blogs:

Day 58

  1. Revisited AD basics from notes and http://tryhackme.com
  2. Read Blogs:

Day 59

  1. Watched some networking lectures on YouTube.
  2. Read Blogs:

Day 60

Read Blogs:

Day 61

  1. Learned some windows priv esc techniques.
  2. Read Blogs:

Day 62

  1. Configured AD for testing purpose.
  2. Read Blogs:

Day 63

  1. Read Blogs:

Day 64

  1. Read Blogs:

Day 65

  1. Read about Zerologon vuln & Updated OSCP boxes sheet.
  2. Read Blogs:

Day 66

  1. Solved Tryhackme room: Active Directory

https://tryhackme.com/room/winadbasics

  1. Read Blogs:

Day 67

  1. Did recon on Target, found a bug as .git exposed.
  2. Read Blogs:

Day 68

  1. Read Blogs:

Day 69

  1. Read Blogs:

Day 70

  1. Found a Vulnerability on a domain, but they aren't running any VDP😑
  2. Read Blog:

Day 71

  1. Revisited OWASP Top10. (this site has good graphical representation)

https://hacksplaining.com/owasp

  1. Read Blogs:

Day 72

  1. Read Blogs:

Day 73

  1. Read Blogs:

Day 74

  1. Completed 2/13 modules of API Pentesting course from https://apisecuniversity.com
  2. Read Blogs:

Day 75

  1. Solved SSRF labs from Portswigger Web Security
  2. Read Blogs:

Day 76

  1. Completed 3/13 modules of API Pentesting course from http://apisecuniversity.com
  2. Read Blogs:

Day 77

  1. Completed 4/13 modules of API Pentesting course from http://apisecuniversity.com
  2. Read Blogs:

Day 78

  1. Read Blogs:

Day 79

  1. Solved CTF challenges
  2. Read Blogs:

Day 80

  1. Read Blogs:

Day 81

  1. Solved CSRF labs from Portswigger Web Security. https://portswigger.net/web-security/csrf
  2. Read Blogs:

Day 82

  1. Read Blogs:

Day 83

  1. Read Blogs:

Day 84

  1. Solved some CSRF labs from Portswigger Web Security.
  2. Read Blogs:

Day 85

  1. Solved OAuth labs from Portswigger Web Security.
  2. Read Blog:

Day 86

  1. Read Blogs:

Day 87

  1. Developing a Enum Tool.
  2. Read Blogs

Day 88

  1. Solved box OWASP Top10 2021 https://tryhackme.com/room/owasptop10
  2. Read Blogs:

Day 89

  1. Read Blogs:

Day 90

  1. Read Blogs

Day 91

  1. Read Blogs

Day 92

  1. Solved XXE labs from Portswigger Web Security.
  2. Read Blogs

Day 93

  1. Read Blogs

Day 94

  1. Wrote a blog on NTLM vs Kerberos: Understanding Authentication in Windows/Active Directory

  2. Read Blog:

Day 95

  1. Read Blog:

Day 96

  1. Working on blog on Kerberoasting in AD.
  2. Read Blog:

Day 97

  1. Read Blog:

Day 98

  1. Read Blog:

Day 99

  1. Read Blog:

Day 100

  1. Read Blogs:

--END--

About

Tracking my progress for 100 days learning something new daily....

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published