Hackerrr_99's profile picture. 👨‍🏫 || SECURITY RESEARCHER || PENTESTING ||

AbuBakri

@Hackerrr_99

👨‍🏫 || SECURITY RESEARCHER || PENTESTING ||

Fissato

I am built for this. Talent means nothing without consistency. I’ll show up, put in the work, and keep pushing, because discipline will take me where talent alone never could. I refuse to quit!


We’re thrilled to announce that applications are now open for the H4ckerTreats 6-Month Cybersecurity Internship Program, starting November 3rd, 2025! At H4ckerTreats, we believe in empowering the next generation of cybersecurity minds through hands-on learning, collaboration,…

Hackerrr_99's tweet image. We’re thrilled to announce that applications are now open for the H4ckerTreats 6-Month Cybersecurity Internship Program, starting November 3rd, 2025!

At H4ckerTreats, we believe in empowering the next generation of cybersecurity minds through hands-on learning, collaboration,…

Repost di AbuBakri

A society that tells a broke man he doesnt deserves a woman, cannot tell a rich man that he should only have one.


Quick Test: How Many Pentesting Terms Do You Actually Know? 🎯 Can you explain the difference between: Black Box vs White Box vs Gray Box testing? Lateral Movement vs Privilege Escalation? Red Team vs Blue Team vs Purple Team? OSINT vs Active Reconnaissance? Exploit vs Payload vs…

Hackerrr_99's tweet image. Quick Test: How Many Pentesting Terms Do You Actually Know? 🎯
Can you explain the difference between:
Black Box vs White Box vs Gray Box testing?
Lateral Movement vs Privilege Escalation?
Red Team vs Blue Team vs Purple Team?
OSINT vs Active Reconnaissance?
Exploit vs Payload vs…

🔐 Network Security isn’t just firewalls and passwords, it’s layered defense at every step of the OSI model. This cheatsheet breaks down the 7 layers of networking and the common security threats at each: 1. Physical Layer: eavesdropping, tampering, interference 2. Data Link…

Hackerrr_99's tweet image. 🔐 Network Security isn’t just firewalls and passwords, it’s layered defense at every step of the OSI model.

This cheatsheet breaks down the 7 layers of networking and the common security threats at each:

1. Physical Layer: eavesdropping, tampering, interference

2. Data Link…

Cybersecurity Complete Suit: Cloud Security: >Cloud Access Control Matrix >Cloud Asset Inventory Tracker >Cloud Backup & Recovery Testing Tracker >Cloud Incident Response Log >Cloud Security Configuration Baseline Network Security: >DDoS Attack Mitigation Plan Tracker >IP…

Hackerrr_99's tweet image. Cybersecurity Complete Suit:

Cloud Security:
>Cloud Access Control Matrix
>Cloud Asset Inventory Tracker
>Cloud Backup & Recovery Testing Tracker
>Cloud Incident Response Log
>Cloud Security Configuration Baseline

Network Security:
>DDoS Attack Mitigation Plan Tracker
>IP…

When I first stepped into the world of cybersecurity, I was completely lost. I didn’t know where to start, what to learn first, or how people even got into this field. All I knew was—I wanted to be a part of this world where people protect, investigate, and defend against…

Hackerrr_99's tweet image. When I first stepped into the world of cybersecurity, I was completely lost.
 I didn’t know where to start, what to learn first, or how people even got into this field. All I knew was—I wanted to be a part of this world where people protect, investigate, and defend against…

🔐 Network Security isn’t just firewalls and passwords, it’s layered defense at every step of the OSI model. This cheatsheet breaks down the 7 layers of networking and the common security threats at each: 1. Physical Layer: eavesdropping, tampering, interference 2. Data Link…

Hackerrr_99's tweet image. 🔐 Network Security isn’t just firewalls and passwords, it’s layered defense at every step of the OSI model.

This cheatsheet breaks down the 7 layers of networking and the common security threats at each:

1. Physical Layer: eavesdropping, tampering, interference

2. Data Link…

🔐 Understanding Network Attack Vectors: A Comprehensive Security Overview Sharing this detailed breakdown of six critical network attack methodologies that every cybersecurity professional should understand: 🎯 MITM (Man-in-the-Middle) - Intercepting communications between…

Hackerrr_99's tweet image. 🔐 Understanding Network Attack Vectors: A Comprehensive Security Overview

Sharing this detailed breakdown of six critical network attack methodologies that every cybersecurity professional should understand:

🎯 MITM (Man-in-the-Middle) - Intercepting communications between…

🔴🟣🟢 𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐋𝐨𝐠 𝐓𝐲𝐩𝐞𝐬: 𝐓𝐡𝐞 𝐁𝐚𝐜𝐤𝐛𝐨𝐧𝐞 𝐨𝐟 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐌𝐨𝐧𝐢𝐭𝐨𝐫𝐢𝐧𝐠 Whether you’re in a SOC, conducting a forensic investigation, or strengthening your threat detection capabilities, log data is everything. Here's a…

Hackerrr_99's tweet image. 🔴🟣🟢 𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐋𝐨𝐠 𝐓𝐲𝐩𝐞𝐬: 𝐓𝐡𝐞 𝐁𝐚𝐜𝐤𝐛𝐨𝐧𝐞 𝐨𝐟 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐌𝐨𝐧𝐢𝐭𝐨𝐫𝐢𝐧𝐠

Whether you’re in a SOC, conducting a forensic investigation, or strengthening your threat detection capabilities, log data is everything.

Here's a…

📡 How Protocols Work in Networking 📡 Every message we send online — emails, web browsing, video calls — follows a set of rules called protocols. They make sure data is organized, transmitted, and received correctly. Just like humans need a common language to communicate,…

Hackerrr_99's tweet image. 📡 How Protocols Work in Networking 📡

Every message we send online — emails, web browsing, video calls — follows a set of rules called protocols.
They make sure data is organized, transmitted, and received correctly.

Just like humans need a common language to communicate,…

🔌 Understanding Network Ports = Stronger Cyber Defense In cybersecurity, knowing common network ports and their associated services is fundamental. Attackers often scan these ports to find open doors, while defenders monitor them to detect anomalies. 📌 Why Ports Matter in…

Hackerrr_99's tweet image. 🔌 Understanding Network Ports = Stronger Cyber Defense

In cybersecurity, knowing common network ports and their associated services is fundamental. Attackers often scan these ports to find open doors, while defenders monitor them to detect anomalies.

📌 Why Ports Matter in…

Loading...

Something went wrong.


Something went wrong.