你可能會喜歡
Hi #folks, Recently, I have earned one more #cybersecurity credential i.e. CREST (CPSA + CRT). If you want to achieve this and seeking study guidance. DM
Hi hackers! This month we are going to collaborate with burpbounty.net and we will giveaway 3 license of "BurpBounty Pro" Only 3 steps to participate: 1. Follow @tbbhunter and @burpbounty 2. RT this tweet 3. Complete this survey cutt.ly/IYUEJfu DL: 17/Dec/2021
I have created a central repo to store all the resources I have created, including Blogs, MindMaps, Talks, Slides, Tools & GoTo Resources. Launching Resources Web: resources.harshbothra.tech I hope you will find it useful. #appsec #bugbountytips #infosec #Hacking #Security
Beautiful #BugBounty hunters! Until next Wednesday, Retweet if you want a discount on my book. I will pick 3 for a free copy and prepare a discount for everyone else if we reach 1k RTs! 🥳🥳 amzn.to/2LFcTl8
Glad to share, i have cleared eWPTX exam. It was really challenging and advanced exam. Thank You @eLearnSecurity for this awesome certification.
OSCP Preparation Tip 4 Beginners 1)Learn types of user in Windows and how to add any user in admin group through command line. 2)RDP access methods and how to enable RDP through command line, registry (Learn all).
OSCP Preparation Tip 4 Beginners 1) Learn types of shell in Linux and how to break restricted shell. 2)Learn password and hash cracking tools (hashcat, John the Ripper, hydra etc.)
OSCP Preparation 4 Beginners 1) Learn file transfer methods (nc, ftp, scp etc.). 2) Learn file sharing Methods (Apache, Python, Ruby server etc)
OSCP Preparation Tip 4 Beginners 1) Learn about ports and services 2) Google, How to exploit or enumerate particular service. Learn all different techniques.
OSCP Preparation Tip 4 Beginners 1)Learn Basic Linux Commands 2)Learn Linux File system and which directory contains what type of data and use. Stay Tune...........
OSCP Tip After compromising a machine, always check for interfaces and services to find other connected machine if any.
OSCP Tip: If you have gone through all the ways to get reverse shell. Donot forget backdoor concept specifically in php. Using the backdoor and can get the shell.
OSCP Tips Whenever you are performing penetration testing for any machine. Your approached should be clear for every port which is opened. From which port you can get reverse shell or information gathering.
OSCP Tip: Donot hurry while exploiting the bufferoverflow. Properly calculate the addressing and remove the bad chars properly. Small mistake will put you in trouble.
OSCP Tip: If you are not getting reverse shell then never forget bind shell.
OSCP Tip: Always skimming the exploit completely. Sometimes you can find the solution at the bottom part of exploit.
United States 趨勢
- 1. Deport Harry Sisson 9,355 posts
- 2. #PokemonZA 1,766 posts
- 3. DuPont 1,869 posts
- 4. Gabe Vincent 4,099 posts
- 5. #PokemonLegendZA 1,645 posts
- 6. #EliraGotCake2025 8,363 posts
- 7. Deloitte 7,135 posts
- 8. Angel Reese 53.6K posts
- 9. tzuyu 254K posts
- 10. #Blackhawks 2,186 posts
- 11. Mavs 5,797 posts
- 12. Lakers 18.4K posts
- 13. Tusky 2,424 posts
- 14. Mad Max 3,977 posts
- 15. Everest 3,508 posts
- 16. #AEWDynamite 18.9K posts
- 17. Blues 20.8K posts
- 18. Birdman 5,507 posts
- 19. Britney 22.6K posts
- 20. Domain For Sale 19.9K posts
Something went wrong.
Something went wrong.