내가 좋아할 만한 콘텐츠
Hi #folks, Recently, I have earned one more #cybersecurity credential i.e. CREST (CPSA + CRT). If you want to achieve this and seeking study guidance. DM
Hi hackers! This month we are going to collaborate with burpbounty.net and we will giveaway 3 license of "BurpBounty Pro" Only 3 steps to participate: 1. Follow @tbbhunter and @burpbounty 2. RT this tweet 3. Complete this survey cutt.ly/IYUEJfu DL: 17/Dec/2021
I have created a central repo to store all the resources I have created, including Blogs, MindMaps, Talks, Slides, Tools & GoTo Resources. Launching Resources Web: resources.harshbothra.tech I hope you will find it useful. #appsec #bugbountytips #infosec #Hacking #Security
Mindmap still holds my name on it
Beautiful #BugBounty hunters! Until next Wednesday, Retweet if you want a discount on my book. I will pick 3 for a free copy and prepare a discount for everyone else if we reach 1k RTs! 🥳🥳 amzn.to/2LFcTl8
Glad to share, i have cleared eWPTX exam. It was really challenging and advanced exam. Thank You @eLearnSecurity for this awesome certification.

OSCP Preparation Tip 4 Beginners 1)Learn types of user in Windows and how to add any user in admin group through command line. 2)RDP access methods and how to enable RDP through command line, registry (Learn all).
OSCP Preparation Tip 4 Beginners 1) Learn types of shell in Linux and how to break restricted shell. 2)Learn password and hash cracking tools (hashcat, John the Ripper, hydra etc.)
OSCP Preparation 4 Beginners 1) Learn file transfer methods (nc, ftp, scp etc.). 2) Learn file sharing Methods (Apache, Python, Ruby server etc)
OSCP Preparation Tip 4 Beginners 1) Learn about ports and services 2) Google, How to exploit or enumerate particular service. Learn all different techniques.
OSCP Preparation Tip 4 Beginners 1)Learn Basic Linux Commands 2)Learn Linux File system and which directory contains what type of data and use. Stay Tune...........
OSCP Tip After compromising a machine, always check for interfaces and services to find other connected machine if any.
OSCP Tip: If you have gone through all the ways to get reverse shell. Donot forget backdoor concept specifically in php. Using the backdoor and can get the shell.
OSCP Tips Whenever you are performing penetration testing for any machine. Your approached should be clear for every port which is opened. From which port you can get reverse shell or information gathering.
OSCP Tip: Donot hurry while exploiting the bufferoverflow. Properly calculate the addressing and remove the bad chars properly. Small mistake will put you in trouble.
OSCP Tip: If you are not getting reverse shell then never forget bind shell.
OSCP Tip: Always skimming the exploit completely. Sometimes you can find the solution at the bottom part of exploit.
United States 트렌드
- 1. Wirtz 57.4K posts
- 2. East Wing 146K posts
- 3. Elander 3,376 posts
- 4. Hamburger Helper 1,233 posts
- 5. $TSLA 45.5K posts
- 6. Estevao 45.9K posts
- 7. SNAP 661K posts
- 8. Danny White 2,917 posts
- 9. Rosneft 3,428 posts
- 10. Ajax 78.6K posts
- 11. Tony Vitello 12.7K posts
- 12. Atalanta 16.9K posts
- 13. Juve 20.8K posts
- 14. #YesOnProp50 8,456 posts
- 15. Vicario 3,166 posts
- 16. Frankfurt 55.2K posts
- 17. Tosin 8,470 posts
- 18. Ekitike 28.5K posts
- 19. Vini 22.3K posts
- 20. Without the 2nd N/A
Something went wrong.
Something went wrong.