Nerd HUDL๐ง๐ โก
@Catalyst_Nerd
Chelsea ๐ Let's Connect ๐ป || Dev || #ZkApes || #ISLM_MAXI Community Mod || @HoudiniFinance (๐งโโ๏ธ,๐งโโ๏ธ) gnoma
ไฝ ๅฏ่ฝๆๅๆญก
Yesterday I revisited the fundamentals of HTTP Requests. Today I explored another layer of web security: HTTP Security Headers: the guards against XSS, clickjacking, insecure redirects & data leaks. #Cybersecurity #WebSecurity
Yesterday, I revisited the foundations of HTTP Requests. Today, I shifted to the other side of the communication flow: HTTP Responses: how servers talk back to clients, and the subtle clues these messages give attackers. #TryHackMe #TechTwitter
Day 63 Hands-On Practical: Nmap scan types, OS & version discovery, port filtering, and outputs completed a pen test for a client, focused on active reconnaissance using Nmap. #Pentest #Nmap #VulnerabilityManagement #InfoSec
Day 62: Today I completed an authorized internal penetration test against an isolated lab environment designed to mirror a clientโs legacy service stack. #CyberSecurity #VulnerabilityAssessment #HandsOnLearning
Day 61 of Learning: Today I explored two OSINT (Open-Source Intelligence) tools that highlight just how much information is available online if you know where to look. #CyberSecurity #OSINT #InfoSec #DigitalFootprint #LearningInPublic
Day 59 of Learning: I explored WhatWeb (aggression level 3) in my lab environment to understand the depth of reconnaissance possible. Key findings included: ๐ต HTTP headers & server banners ๐ต TLS certificate details #Cybersecurity #WhatWeb #EthicalHacking #Infosec #WebSecurity
Here's a little math problem about GRID ๐ค Multiple agentic capabilities available in one place Data sources across industries + Reasoning to bring it all together โโโโโโโโโโโโโโโโโโโโโโโโโโ = The best answers you can ask for
Here's a little math problem about GRID ๐ค Multiple agentic capabilities available in one place Data sources across industries + Reasoning to bring it all together โโโโโโโโโโโโโโโโโโโโโโโโโโ = The best answers you can ask for
Iโve officially completed the @CiscoNetAcad Ethical Hacker course and earned the certificate ๐ It built a solid foundation in ethical hacking and offensive security. Excited to keep learning and growing in cybersecurity. #CyberSecurity #EthicalHacking #Cisco
Day 57: Post-Exploitation, Persistence & Evasion Todayโs focus in my ethical hacking journey was on what happens after gaining access to a system: staying in, moving around, and avoiding detection. ๐งต #EthicalHacking #RedTeam
Day 56: Penetration Testing Tools & Exploit Code Analysis. โ๏ธ Today, I focused on understanding when, why, and how different tools are used across four major categories of a penetration test. #Cybersecurity #LearningInPublic
Day 55: Understanding Scripting Logic in Cybersecurity. Today was all about the fundamentals of scripting and how they tie directly into cybersecurity tasks like automation, analysis, and tool building. ๐งต #CyberSecurity #BlueDotLogs #Day55
Day 53โ54 of My Cybersecurity Journey: From Vulnerability Discovery to Strategic Remediation During a pentest on a vulnerable DVWA server (10.6.6.13), I shifted focus from just scanning to what separates beginners from professionals: Letโs break it down. ๐๐งต
Day 52 of My Cybersecurity Journey โ The Power of Reporting: Letโs talk about something that separates script kiddies from professionals. How we report findings after a penetration test. Itโs not just what you find - itโs how you communicate it.๐งต๐ #CyberSecurityJourney
Day 50 โ 51 of My Cybersecurity Journey: Post-Exploitation, Persistence & Lateral Movement. Happy New Month, everyone! ๐ซ Initial access is the start. The real challenge begins with maintaining control, moving across systems, and avoiding detection. Letโs break it down. ๐งต๐
Day 49 of My Cybersecurity Journey: Post-Exploitation, Footholds & Persistence After gaining access to a system, what comes next? Today, I explored how attackers maintain access after a successful compromise. Here's what I learned: ๐๐งต #CyberSecurity #EthicalHacking #InfoSec
Day 48 of My Cybersecurity Journey Todayโs focus was on IoT protocols. Letโs break it down ๐ #Cybersecurity #IoTSecurity #Day48
Day 47 of #CybersecurityJourney Exploring Attacks on Mobile & IoT Systems Todayโs focus: how attackers compromise the systems we carry in our pockets and the "smart" devices around us. Letโs break it down ๐๐งต #Cybersecurity #MobileSecurity #IoTSecurity #EthicalHacking
Day 46: Cont'd โ Cloud, Mobile & IoT Security. Todayโs deep dive into offensive cloud security techniques was packed. Here's what I explored, practiced, and documented ๐๐งต #CyberSecurity #CloudSecurity #EthicalHacking
Day 45: Cloud, Mobile & IoT Security Today, I explored one of the most important areas in cybersecurity: Cloud Security with a focus on how attackers exploit cloud infrastructure. Letโs break it down ๐ #CyberSecurity #EthicalHacking #CloudSecurity
United States ่ถจๅข
- 1. Chris Paul 15.6K posts
- 2. #SpotifyWrapped 14.8K posts
- 3. Clippers 24.3K posts
- 4. Good Wednesday 28.2K posts
- 5. #NSD26 4,673 posts
- 6. #WednesdayMotivation 3,273 posts
- 7. Happy Hump 6,216 posts
- 8. Hump Day 9,424 posts
- 9. FELIX LV VISIONARY SEOUL 25.8K posts
- 10. National Signing Day 2,886 posts
- 11. #FELIXxLouisVuitton 29.1K posts
- 12. TOP CALL 10.1K posts
- 13. Nashville 31K posts
- 14. #PutThatInYourPipe N/A
- 15. The BIGGะST 296K posts
- 16. jungkook 263K posts
- 17. Elden Campbell N/A
- 18. Somalians 86.5K posts
- 19. Somalis 100K posts
- 20. Market Focus 4,621 posts
ไฝ ๅฏ่ฝๆๅๆญก
-
Bluemool Limited
@bluemoolltd -
JustParkwell
@JustParkwell -
Femi for HOR Eti Osa Campaign Office
@Femi4HOR -
Tobiah ๐โโ๏ธ
@TobiahRims -
traderkareem
@A_dkareem -
Thayaw
@Sphinxtee -
Everything Kids Online
@everythingkidss -
ๅ
@not0jay -
0xRaphael๐,๐
@official_Lagwaa -
Veeki Estate And Properties Limited
@veekiestate -
satimaClemz
@ClemzSatima -
Aderemi Azeez
@raycre8tives -
Opoobo
@opoobo
Something went wrong.
Something went wrong.