Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile
Tonia | Digitalab ☁️ |Orange Web3

@amintemi69

$CYBRO

ID: 1813249882636812305

calendar_today16-07-2024 16:31:02

1,1K Tweet

14 Takipçi

220 Takip Edilen

Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile Photo

Linux commands every pentester must know: find / -perm -4000 → SUID files ls -la → hidden files ps aux → running processes netstat -tulnp → open ports cron -l → scheduled jobs uname -a → kernel version Save this. #LinuxPrivEsc

Linux commands every pentester must know:

find / -perm -4000 → SUID files
ls -la → hidden files
ps aux → running processes
netstat -tulnp → open ports
cron -l → scheduled jobs
uname -a → kernel version

Save this. #LinuxPrivEsc
Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile Photo

Getting a low-privilege shell is just the start. Privilege escalation is where the real skill shows. Root access changes everything. #PrivEsc #Pentesting

Getting a low-privilege shell is just the start. Privilege escalation is where the real skill shows. Root access changes everything. #PrivEsc #Pentesting
Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile Photo

Metasploit is one of the most powerful frameworks in ethical hacking. But use it as a learning tool first, not a shortcut. Understand what each module does under the hood. #Metasploit #EthicalHacking

Metasploit is one of the most powerful frameworks in ethical hacking. But use it as a learning tool first, not a shortcut. Understand what each module does under the hood. #Metasploit #EthicalHacking
Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile Photo

A reverse shell is the moment a pentest becomes real. The machine calls back to you. That connection represents full code execution on a remote system. #ReverseShell #EthicalHacking

A reverse shell is the moment a pentest becomes real. The machine calls back to you. That connection represents full code execution on a remote system. #ReverseShell #EthicalHacking
Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile Photo

Shell types explained: Reverse shell → target connects to attacker Bind shell → attacker connects to target Web shell → persistent code on web server Each has detection profiles. Know when to use each. #Shells #Pentesting

Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile Photo

Most breaches still start with compromised credentials. Password attacks remain as relevant as ever. Understand them to defend against them. #PasswordSecurity #EthicalHacking

Most breaches still start with compromised credentials. Password attacks remain as relevant as ever. Understand them to defend against them. #PasswordSecurity #EthicalHacking
Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile Photo

Password attack types: → Brute force: try every combination → Dictionary: wordlist-based → Credential stuffing: reuse leaked creds → Password spraying: one password, many accounts → Hash cracking: offline with Hashcat/John #Hydra #Hashcat #Pentesting

Password attack types:

→ Brute force: try every combination
→ Dictionary: wordlist-based
→ Credential stuffing: reuse leaked creds
→ Password spraying: one password, many accounts
→ Hash cracking: offline with Hashcat/John

#Hydra #Hashcat #Pentesting
Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile Photo

WiFi security is physical security. The network you trust in a coffee shop, a bar, a chilling spot, a hotel, an office it can all be weaponised against you. #WiFiSecurity #EthicalHacking

WiFi security is physical security. The network you trust in a coffee shop, a bar, a chilling spot, a hotel, an office it can all be weaponised against you. #WiFiSecurity #EthicalHacking
Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile Photo

If you're a web app pentester and haven't memorised the OWASP Top 10, that's your task for today. It's the map of where to look first. #OWASP #WebHacking

If you're a web app pentester and haven't memorised the OWASP Top 10, that's your task for today. It's the map of where to look first. #OWASP #WebHacking
Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile Photo

Active Directory is the nervous system of most enterprise networks. Attacking it is the highest-value skill in offensive security. Learn it properly. #ActiveDirectory #EthicalHacking

Active Directory is the nervous system of most enterprise networks. Attacking it is the highest-value skill in offensive security. Learn it properly. #ActiveDirectory #EthicalHacking
Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile Photo

Kerberos is elegant authentication on paper. In practice, service accounts with weak passwords turn it into an attacker's gift. Kerberoasting is still highly effective. #Kerberos #EthicalHacking

Kerberos is elegant authentication on paper. In practice, service accounts with weak passwords turn it into an attacker's gift. Kerberoasting is still highly effective. #Kerberos #EthicalHacking
Tonia | Digitalab ☁️ |Orange Web3 (@amintemi69) 's Twitter Profile Photo

Yesterday at Hackademy, the Hackademy team and @officialwhyte hacked a scammer’s system from India who was scamming people out of money; he was posing as a recruiter. We gained access, disabled his windows defender & exfiltrated all the data from his system Long live Hackademy!

Yesterday at <a href="/hack_ademy/">Hackademy</a>, the Hackademy team and @officialwhyte hacked a scammer’s system from India who was scamming people out of money; he was posing as a recruiter.
We gained access, disabled his windows defender &amp; exfiltrated all the data from his system
Long live Hackademy!