你可能會喜歡
Hi #folks, Recently, I have earned one more #cybersecurity credential i.e. CREST (CPSA + CRT). If you want to achieve this and seeking study guidance. DM
Hi hackers! This month we are going to collaborate with burpbounty.net and we will giveaway 3 license of "BurpBounty Pro" Only 3 steps to participate: 1. Follow @tbbhunter and @burpbounty 2. RT this tweet 3. Complete this survey cutt.ly/IYUEJfu DL: 17/Dec/2021
I have created a central repo to store all the resources I have created, including Blogs, MindMaps, Talks, Slides, Tools & GoTo Resources. Launching Resources Web: resources.harshbothra.tech I hope you will find it useful. #appsec #bugbountytips #infosec #Hacking #Security
Beautiful #BugBounty hunters! Until next Wednesday, Retweet if you want a discount on my book. I will pick 3 for a free copy and prepare a discount for everyone else if we reach 1k RTs! 🥳🥳 amzn.to/2LFcTl8
Glad to share, i have cleared eWPTX exam. It was really challenging and advanced exam. Thank You @eLearnSecurity for this awesome certification.

OSCP Preparation Tip 4 Beginners 1)Learn types of user in Windows and how to add any user in admin group through command line. 2)RDP access methods and how to enable RDP through command line, registry (Learn all).
OSCP Preparation Tip 4 Beginners 1) Learn types of shell in Linux and how to break restricted shell. 2)Learn password and hash cracking tools (hashcat, John the Ripper, hydra etc.)
OSCP Preparation 4 Beginners 1) Learn file transfer methods (nc, ftp, scp etc.). 2) Learn file sharing Methods (Apache, Python, Ruby server etc)
OSCP Preparation Tip 4 Beginners 1) Learn about ports and services 2) Google, How to exploit or enumerate particular service. Learn all different techniques.
OSCP Preparation Tip 4 Beginners 1)Learn Basic Linux Commands 2)Learn Linux File system and which directory contains what type of data and use. Stay Tune...........
OSCP Tip After compromising a machine, always check for interfaces and services to find other connected machine if any.
OSCP Tip: If you have gone through all the ways to get reverse shell. Donot forget backdoor concept specifically in php. Using the backdoor and can get the shell.
OSCP Tips Whenever you are performing penetration testing for any machine. Your approached should be clear for every port which is opened. From which port you can get reverse shell or information gathering.
OSCP Tip: Donot hurry while exploiting the bufferoverflow. Properly calculate the addressing and remove the bad chars properly. Small mistake will put you in trouble.
OSCP Tip: If you are not getting reverse shell then never forget bind shell.
OSCP Tip: Always skimming the exploit completely. Sometimes you can find the solution at the bottom part of exploit.
United States 趨勢
- 1. Lakers 88.4K posts
- 2. Luka 68.4K posts
- 3. Ayton 14.7K posts
- 4. Marcus Smart 8,359 posts
- 5. Curry 40.8K posts
- 6. Warriors 95.9K posts
- 7. Sengun 25.2K posts
- 8. Shai 33.4K posts
- 9. #DWTS 48.3K posts
- 10. Rockets 58.5K posts
- 11. Draymond 8,294 posts
- 12. Double OT 6,556 posts
- 13. #DubNation 13K posts
- 14. Reaves 9,065 posts
- 15. Jimmy Butler 8,987 posts
- 16. #LakeShow 6,565 posts
- 17. Vando 2,951 posts
- 18. LeBron 36.4K posts
- 19. #TusksUp 1,067 posts
- 20. Reed Sheppard 6,682 posts
Something went wrong.
Something went wrong.