This isn't kali linux on virtual-box or bare-metal....
This is kali linux on wsl ( GUI )... much better.....faster..... safe...... very easy to setup....
#kali_on_wsl
Getting started into cybersecurity ?......
Learn scripting languages -
1. Python
2. Bash
3. Ruby
4. Go
5. Perl
6. Php
7. Lua
Even if you can't learn to write scripts and tools with them, learn to read and understand their code, it'll help you in the journey.
OWASP Juice Shop Setup:
- apt install docker-ce
- docker pull bkimminich/juice-shop
- docker run --rm -p 3000:3000 bkimminich/juice-shop
Have Fun... Keep Learning..... Practice More Than You Learn..... You'll Get There.
How I approach a machine during penetration testing ( Scanning ) !
1. Run rustscan to quickly discover open ports...
2. Feed the open ports discovered from rustscan scan to nmap for further enumeration !
Very fast for me ! Or do you want for your nmap scan to complete ?
As a penetration tester, learn and master web application security and exploitation.....
You'll face some challenges if you don't know web application security and testing....
#web
#pentesting
Who told you solving CTFs challenges does not worth it in cybersecurity
CTFs get you started into cybersecurity okay...
1. Binary
2. Reverse engineering
3. Web
4. Cryptography
You'll find all this in the real world, I'll tell you.
Get Started 👌
Omoh this cybersecurity journey sha ! No be for the weak ooooo 😂, I will just advice you to just stay "consistent", no matter how hard the journey is !!!
#cybersecurity
Hello, I'm looking to
#Connect
with people who are in the field 👇
- web development
- Cybersecurity
- ethical hacking
- machine learning
- data science
- Python
Let's Connect 🤪
WhatsApp - +2349116101689
#armyspy
#Connect
Pentesting101
When scanning for open ports and services, and found ftp on port 21 opened, do not forget to check for anonymous access ( you might find sensitive files on the server ) !
#nmap
#pentesting101
#cyb3rf0rtr3ss
Covering your track in linux !
- history -c ( clear the .bash_history )
- sudo truncate -s 0 /var/logs/access.log ( same goes to all .log files in the /var/logs/ directory ).
#linux
#security
#ethical_hacking
It's not until you gain access to a system, you call it "HACKING"
Making an application to do what it's not intended to do, is an "HACK"
An application is made to show "A", but you made it show "B", that's hacking... 👌
My advice to everyone in this cybersecurity journey.
Embrace the journey! Stay curious, keep learning, and face challenges as growth opportunities. Integrity is key—use your skills for good and make a difference. Believe in yourself; your passion will lead to great achievements.
Why do hackers love Python? 🐍
Easy to learn and use
Extensive libraries for networking and cryptography
Fast prototyping
Cross-platform compatibility
Python's versatility makes it a go-to tool for ethical hacking and cybersecurity tasks.
#EthicalHacking
#PythonProgramming
@Phantom_Secure
well, i am so sorry for whatever i did today, it wasn't intentional, i have no bad reputation or plan for the platform or organization, i already pleaded an apology to them, i am so sorry for everything...
Here is a web application i developed for cybersecurity enthusiasts and penetration testing !
Will be updating it as time goes on !
@three_cube
@hack_sparo
Free kali-linux server for penetration testing.... this is gonna be helpful to those who're finding it difficult to set up kali linux on their machine or PC...
Make sure to save your secret key, it can be used to access your server without losing your saved datas.....
Imagine someone saying "Network engineering" isn't a field under cybersecurity, wtf are you saying dude
You still kept on arguing like you know what you're saying....
Some people sha too like to dey do like say dey sabi everything.
Cybersecurity isn't about competition bruh!!!
Learn to research, stop asking question every time.. there is Google, chatgpt, what else do you do you want ?
Most of us here are very bad in making research, WHY ? Is that so difficult ? Huh, I'm tired !
Learn API Penetration Testing & Security....
Large percentage of websites, IoT devices, Mobile Phones, Cars. e.t.c Communicate through the use of APIs.
Hacking API can lead to critical damage in the application...
@apisecu
Will be sharing this Bug Bounty Practical Guide (cherry tree document ) to my active followers 😁, when I'm done, it will have everything you need to get started.......
Like 👍
Retweet 💢
#Bug_Bounty
This isn't kali linux on virtual-box or bare-metal....
This is kali linux on wsl ( GUI )... much better.....faster..... safe...... very easy to setup....
#kali_on_wsl
Need to train myself to become a better penetration tester.....
1. API Pentesting
2. Network Pentesting
3. Web Application Pentesting
4. IoT Pentesting
#my_career_path
#pentesting
Spectar has been pwned !
Duration: 10min, yeah, it was really looking hard cause i was going down the rabbit hole though ! great job to
@hack_sparo
for making this awesome lab !
It worth it !
Today was so much fun ! 😁,
#lasuTechX
was a massive shut down... connecting with people is something you should learn, you don't know what is ahead of you !
#learn
#connect
"Stay consistent with hard work in what ever you do !" Is a motivation I got from her
@sisinerdtweets
Cybersecurity WannaBe !
Programming Language Is Really essential in cybersecurity, Learn IT. No one might say this to you, but I will.
Be Good With Scripting ! ( python, Bash ), it's gonna help you in the journey !
Lastly, Consistency is the key !
My definition on "Penetration Testing" 👌
Carrying out real-world cyber attack against a system, network, company or organisation in other to discover & patch vulnerabilities before the bad guys could get in ! 💓
#penetration_testing
#training_to_be_better
mKingdom
@RealTryHackMe
Is pretty insane, but the machine difficulty is "easy" 😂
How long did it take you guys to get into the system !
@hack_sparo
search_path[]=?search=, could someone tell if this has a local file inclusion vulnerability ?
Cuz I was totally stucked here
Can you read a content of a file in linux without using the following commands ?
cat, grep, less, more, head, tail, vim, rvim, vi, nl, sed, awk, nano, gedit, find, file, curl, python, scp
Let's Play A Game
./aipscan is a port scanning utility that can evade firewall / Intrusion detection system....
it's a ghost in the wire, wireshark can't see !!!
Coming Soon...
Will also be available to install via - apt install aipscan....
Tip101: finding API endpoints in web applications -
1. Check the source code ( .js files )
2. Check the Content-Type ( application/json )
3. Crawl the web application using burp crawler.
4. Using Google dork ( site:"" "api" )
The DC ( domain controller ) is the most important server of any business, and if you can gain access to it, you have full control over every thing else in that network...
#cybersecurity
Don't be deceived, learn and know the basics of programming if you are getting started into cybersecurity, do not listen to any one who tells you that.
Sql injection is the most severe web application vulnerability.......
Learn to mitigate it... developers, learn more of secure coding practice, it'll help you...
Been waiting for this for a very long time....
Really not good at bypassing security checks in file upload features ! So I'm learning 😁
Join Me 👌
#websiteSecurity
@PortSwigger
Imagine person wey just start cybersecurity today, don dey get one mumu pride.....
Bruh, cybersecurity isn't about competition or who know better......
Stop that mindset.... You ain't gonna get far with it, truth to be told 😶
Incognito mode doesn't make you anonymous, it doesn't hide your identity from your isp ( internet service provider ), it only makes you browse safely, don't believe when others says "you'll be anonymous", "You can't be tracked" !!!
#cyberfortress
#CyberSecurity