你可能會喜歡
Hi #folks, Recently, I have earned one more #cybersecurity credential i.e. CREST (CPSA + CRT). If you want to achieve this and seeking study guidance. DM
Hi hackers! This month we are going to collaborate with burpbounty.net and we will giveaway 3 license of "BurpBounty Pro" Only 3 steps to participate: 1. Follow @tbbhunter and @burpbounty 2. RT this tweet 3. Complete this survey cutt.ly/IYUEJfu DL: 17/Dec/2021
burpbounty.net
Inicio - Burp Bounty
Burp Bounty Professional Website vulnerability scanner. Professional, advanced, and highly customizable. Try for Free Buy Pro or discover more Professional, advanced, and highly customizable website...
I have created a central repo to store all the resources I have created, including Blogs, MindMaps, Talks, Slides, Tools & GoTo Resources. Launching Resources Web: resources.harshbothra.tech I hope you will find it useful. #appsec #bugbountytips #infosec #Hacking #Security
Beautiful #BugBounty hunters! Until next Wednesday, Retweet if you want a discount on my book. I will pick 3 for a free copy and prepare a discount for everyone else if we reach 1k RTs! 🥳🥳 amzn.to/2LFcTl8
Glad to share, i have cleared eWPTX exam. It was really challenging and advanced exam. Thank You @eLearnSecurity for this awesome certification.
OSCP Preparation Tip 4 Beginners 1)Learn types of user in Windows and how to add any user in admin group through command line. 2)RDP access methods and how to enable RDP through command line, registry (Learn all).
OSCP Preparation Tip 4 Beginners 1) Learn types of shell in Linux and how to break restricted shell. 2)Learn password and hash cracking tools (hashcat, John the Ripper, hydra etc.)
OSCP Preparation 4 Beginners 1) Learn file transfer methods (nc, ftp, scp etc.). 2) Learn file sharing Methods (Apache, Python, Ruby server etc)
OSCP Preparation Tip 4 Beginners 1) Learn about ports and services 2) Google, How to exploit or enumerate particular service. Learn all different techniques.
OSCP Preparation Tip 4 Beginners 1)Learn Basic Linux Commands 2)Learn Linux File system and which directory contains what type of data and use. Stay Tune...........
OSCP Tip After compromising a machine, always check for interfaces and services to find other connected machine if any.
OSCP Tip: If you have gone through all the ways to get reverse shell. Donot forget backdoor concept specifically in php. Using the backdoor and can get the shell.
OSCP Tips Whenever you are performing penetration testing for any machine. Your approached should be clear for every port which is opened. From which port you can get reverse shell or information gathering.
OSCP Tip: Donot hurry while exploiting the bufferoverflow. Properly calculate the addressing and remove the bad chars properly. Small mistake will put you in trouble.
OSCP Tip: If you are not getting reverse shell then never forget bind shell.
OSCP Tip: Always skimming the exploit completely. Sometimes you can find the solution at the bottom part of exploit.
United States 趨勢
- 1. Australia 434K posts
- 2. Hanukkah 137K posts
- 3. Good Sunday 67.9K posts
- 4. Brown University 260K posts
- 5. Naveed Akram 59K posts
- 6. #HealingServiceDay 6,644 posts
- 7. Muhammad Qasim 18.8K posts
- 8. #sundayvibes 4,040 posts
- 9. Gunther 99.7K posts
- 10. Blessed Sunday 18.6K posts
- 11. Spurs 77.9K posts
- 12. Rhode Island 62.8K posts
- 13. Chabad 14.3K posts
- 14. Guns 95.7K posts
- 15. #SundayMotivation 1,700 posts
- 16. Albanese 57.5K posts
- 17. #DrAllyxJossGawin 108K posts
- 18. Chrisean 8,998 posts
- 19. Ahmed 79.2K posts
- 20. Triple H 110K posts
Something went wrong.
Something went wrong.