Winston Ighodaro (@officialwhyte22) 's Twitter Profile
Winston Ighodaro

@officialwhyte22

Founder of Cybergeneration: Ethical Hacker Security+, Network+, Pentest+, and CNVP. Python, bash, Powershell, VBS, Java script, Html and C#. I am root.

ID: 1540448759083048962

linkhttps://linktree-bice.vercel.app/ calendar_today24-06-2022 21:36:42

2,2K Tweet

4,4K Takipçi

178 Takip Edilen

Winston Ighodaro (@officialwhyte22) 's Twitter Profile Photo

I gained full root access via SSH on a production server and extracted admin credentials from /root/creds.txt. This is why misconfigured sudo access is a critical risk.

I gained full root access via SSH on a production server  and extracted admin credentials from /root/creds.txt.

This is why misconfigured sudo access is a critical risk.
Winston Ighodaro (@officialwhyte22) 's Twitter Profile Photo

Found something weird in /robots.txt on a server. Turns out it was a base64-encoded Python backdoor disguised as a system note. Decoded it, and it calls back to port 4444. Stay paranoid.

Found something weird in /robots.txt on a  server.
Turns out it was a base64-encoded Python backdoor disguised as a system note.
Decoded it, and it calls back to port 4444. Stay paranoid.
Winston Ighodaro (@officialwhyte22) 's Twitter Profile Photo

Love the idea, but no data protection notice? If you’re collecting people’s personal info, GDPR is essential.People deserve to know how their data’s used.

Winston Ighodaro (@officialwhyte22) 's Twitter Profile Photo

I used tcpdump to sniff FTP logins in plaintext from a public IP server. After capturing credentials, I logged in via FTP and download sensitive files. This is why unencrypted protocols like FTP are dangerous! 🕵️‍♂️📡

I used tcpdump to sniff FTP logins in plaintext from a public IP server. After capturing credentials, I logged in via FTP and download sensitive files. This is why unencrypted protocols like FTP are dangerous! 🕵️‍♂️📡
Winston Ighodaro (@officialwhyte22) 's Twitter Profile Photo

I found a suspicious binary maintaining a stealthy connection to a remote server. The process was running as root, hidden in plain sight. Always check what's talking over the wire.

I found a suspicious binary maintaining a stealthy connection to a remote server. The process was running as root, hidden in plain sight. Always check what's talking over the wire.
Winston Ighodaro (@officialwhyte22) 's Twitter Profile Photo

I gained root access to a remote Linux server by logging in with stolen credentials and discovering the user had full sudo rights.

I gained root access to a remote Linux server by logging in with stolen credentials and discovering the user had full sudo rights.