LetsDefendIO's profile picture. LetsDefend, now part of Hack The Box. Read more: https://letsdefend.io/blog/letsdefend-joining-hack-the-box

LetsDefend

@LetsDefendIO

LetsDefend, now part of Hack The Box. Read more: https://letsdefend.io/blog/letsdefend-joining-hack-the-box

Cybersecurity Search Engines


How SMTP Works?

LetsDefendIO's tweet image. How SMTP Works?

Layers of OSI Model


Resources for OSINT

LetsDefendIO's tweet image. Resources for OSINT

🛠️ New Course: NICs and Physical Network Cabling Dive into our course to learn the essentials of NICs and physical network cabling through engaging tutorials, boosting your network knowledge effectively.

LetsDefendIO's tweet image. 🛠️ New Course: NICs and Physical Network Cabling

Dive into our course to learn the essentials of NICs and physical network cabling through engaging tutorials, boosting your network knowledge effectively.

SOC Team vs Pentester


Do you really want to cry?

LetsDefendIO's tweet image. Do you really want to cry?

Authentication Methods


Happy experts, happy life

LetsDefendIO's tweet image. Happy experts, happy life

No meme today, it's my birthday! 🎂 We started 5 years ago. 5, FIVE. Your support has been our motivation, thank you all! 💙 🦔

LetsDefendIO's tweet image. No meme today, it's my birthday! 🎂 

We started 5 years ago. 5, FIVE. Your support has been our motivation, thank you all! 💙 🦔

Cybersecurity with Smart Glasses

LetsDefendIO's tweet image. Cybersecurity with Smart Glasses

DHCP


⚠️ New SOC Alert: System Service Discovery Detected Attackers use System Service Discovery to identify running system services, find vulnerabilities, gather system configuration info, and plan tailored attacks or lateral movement within a network. This helps them exploit…

LetsDefendIO's tweet image. ⚠️ New SOC Alert: System Service Discovery Detected 

Attackers use System Service Discovery to identify running system services, find vulnerabilities, gather system configuration info, and plan tailored attacks or lateral movement within a network. This helps them exploit…

Cybersecurity Job Intereviews in 2025

LetsDefendIO's tweet image. Cybersecurity Job Intereviews in 2025

⚠️ New course for Threat Hunters!

LetsDefendIO's tweet image. ⚠️ New course for Threat Hunters!

Pentester

LetsDefendIO's tweet image. Pentester

Cybersecurity Experts

LetsDefendIO's tweet image. Cybersecurity Experts

I need the address of the VT office!

LetsDefendIO's tweet image. I need the address of the VT office!

⚠️ New Challenge: Kerberoasting Kerberoasting is an attack where adversaries request Kerberos service tickets from Active Directory, extract encrypted credentials, and crack them offline to obtain service account passwords and escalate privileges.

LetsDefendIO's tweet image. ⚠️ New Challenge: Kerberoasting

Kerberoasting is an attack where adversaries request Kerberos service tickets from Active Directory, extract encrypted credentials, and crack them offline to obtain service account passwords and escalate privileges.

Cybersecurity job salary

LetsDefendIO's tweet image. Cybersecurity job salary

Loading...

Something went wrong.


Something went wrong.