Adanna Profile
Adanna

@Adanna_techie

Followers
180
Following
11K
Media
50
Statuses
459

Passionate about Cybersecurity || Aspiring SOC Analyst || @Tech4devHQ Women techster fellow 2025 ||

Joined June 2022
Don't wanna be here? Send us removal request.
@DGilcore
DGilcore
4 days
I have always had a hard time understanding toplogies, Switch,Router, DHCP messages and ARP request and reply. But with this room i finally understand them fully https://t.co/ci0XTpyCdX #tryhackme via @realtryhackme @Adanna_techie @AdePelumi15 @ireteeh
tryhackme.com
Learn about some of the technologies and designs that power private networks
0
2
3
@DGilcore
DGilcore
5 days
I learned how website work, what HTML injection are and how to inspect a page to see if any sensitive info is found https://t.co/eu44FZzfgc #tryhackme via @realtryhackme @Adanna_techie @AdePelumi15
Tweet card summary image
tryhackme.com
To exploit a website, you first need to know how they are created.
0
2
2
@Adanna_techie
Adanna
8 days
but this experience humbled me and taught me so much more than I expected. If you’re looking to get more hands-on with Linux, I definitely recommend checking it out.
0
0
2
@Adanna_techie
Adanna
8 days
Day 35–38/100 I took some time to go through the OverTheWire Bandit challenge as part of the @Tech4DevHQ fellowship end-of-month assessment. I thought I knew the Linux command line well, @ireteeh @elormkdaniel @THESTREETVOICE3 #100DaysOfCybersecurity
@Adanna_techie
Adanna
14 days
Day 34/100 Joined this Twitter space to discuss about networking @THESTREETVOICE3 @ireteeh @elormkdaniel @segoslavia #100DaysOfCyberSecurity
1
0
8
@Adanna_techie
Adanna
14 days
Day 34/100 Joined this Twitter space to discuss about networking @THESTREETVOICE3 @ireteeh @elormkdaniel @segoslavia #100DaysOfCyberSecurity
1
1
7
@Adanna_techie
Adanna
15 days
@Adanna_techie
Adanna
16 days
Day 31 & 32/100 Conducted a controlled lab exercise: executed a Metasploit exploit against a Windows VM to deepen my understanding of endpoint security. @ireteeh @elormkdaniel @segoslavia @Tech4DevHQ #100DaysOfCybersecurity #WTF25
2
1
15
@Adanna_techie
Adanna
16 days
Day 31 & 32/100 Conducted a controlled lab exercise: executed a Metasploit exploit against a Windows VM to deepen my understanding of endpoint security. @ireteeh @elormkdaniel @segoslavia @Tech4DevHQ #100DaysOfCybersecurity #WTF25
@Adanna_techie
Adanna
18 days
Day 30/100 Today I focused on endpoints and the controls that protect them: Antivirus/Antimalware, EDR/XDR, DLP, UBA, and HIDS/HIPS. I also learned about the key telemetry used to @ireteeh @elormkdaniel @THESTREETVOICE3 @segoslavia #100DaysOfCybersecurity
0
0
9
@HenshawKate
Kate Amaka Henshaw
16 days
History will remember the leaders who protected our children. Nigeria has made some progress in immunisation - now, let us finish strong. Please release the 2024/2025 immunisation funds.📌 Save the future of our children. #FundImmunizationNow #VaccinesWork @Fmohnigeria
112
3K
3K
@Adanna_techie
Adanna
18 days
monitor endpoints, process execution, file-system changes, network connections, and registry modifications, and why each signal is important for detection and response. Finally, I built a simple payload in my isolated lab using Metasploit to test detection and logging.
0
0
1
@Adanna_techie
Adanna
18 days
Day 30/100 Today I focused on endpoints and the controls that protect them: Antivirus/Antimalware, EDR/XDR, DLP, UBA, and HIDS/HIPS. I also learned about the key telemetry used to @ireteeh @elormkdaniel @THESTREETVOICE3 @segoslavia #100DaysOfCybersecurity
@Adanna_techie
Adanna
19 days
Day 29/100 Today I wrote a Snort rule to detect .exe file downloads over HTTP traffic. I then tested it using a pcap file to validate that the detection works as expected. @ireteeh @segoslavia @elormkdaniel @THESTREETVOICE3 #100DaysofCybersecurity
1
1
18
@Adanna_techie
Adanna
19 days
Day 29/100 Today I wrote a Snort rule to detect .exe file downloads over HTTP traffic. I then tested it using a pcap file to validate that the detection works as expected. @ireteeh @segoslavia @elormkdaniel @THESTREETVOICE3 #100DaysofCybersecurity
@Adanna_techie
Adanna
20 days
Day 27 & 28/100 On today's episode of my cybersecurity journey, I explored Snorpy Built a rule to block all FTP traffic and learnt how Snort rules are structured and how Snorpy makes it easier to generate them. @ireteeh @elormkdaniel @segoslavia #100DaysOfCybersecurity
0
1
6
@Adanna_techie
Adanna
20 days
Day 27 & 28/100 On today's episode of my cybersecurity journey, I explored Snorpy Built a rule to block all FTP traffic and learnt how Snort rules are structured and how Snorpy makes it easier to generate them. @ireteeh @elormkdaniel @segoslavia #100DaysOfCybersecurity
@Adanna_techie
Adanna
22 days
Day 25 & 26/100 Learnt how to write snort rules. #100DaysOfCybersecurity
0
0
6
@Adanna_techie
Adanna
22 days
Day 25 & 26/100 Learnt how to write snort rules. #100DaysOfCybersecurity
@Adanna_techie
Adanna
24 days
Day 23-24/100 Spent the day configuring and reconfiguring my snort.lua file. #100DaysOfCyberSecurity
0
0
6
@NxtGenCyberStar
Sstarr
23 days
“GhostAction” Open-Source Supply Chain Campaign🔥 Did you know? As of early September 2025, at least 817 open-source GitHub projects were found with malicious GitHub Actions workflows that stole environment variables and tokens. Read More👇 How It Happened
1
1
5
@Adanna_techie
Adanna
24 days
Day 23-24/100 Spent the day configuring and reconfiguring my snort.lua file. #100DaysOfCyberSecurity
@Adanna_techie
Adanna
25 days
Day 22/100 Today I learnt about the MITRE ATT&CK framework #100DaysOfCyberSecurity
0
1
7
@wildfl0w6r
Bee
25 days
Day 20 of #100DaysOfCyberSecurity @ireteeh @segoslavia I just finished Linux Fundamentals Part 3 on Tryhackme. I practiced using text editors, learned about package management, system logs and how processes work. #WTFC26 #Tech4Dev #CyberSecurity #Linux
@wildfl0w6r
Bee
26 days
Day 19 of #100DaysOfCyberSecurity @ireteeh @segoslavia Today we had a soft skills session on self-assessment & career growth. Key takeaways: • Your career grows when your self awareness grows. • Build a personal board of directors: mentors, sponsors, & peers who guide 👇🏽
5
1
21
@Adanna_techie
Adanna
25 days
Day 22/100 Today I learnt about the MITRE ATT&CK framework #100DaysOfCyberSecurity
@Adanna_techie
Adanna
28 days
Day 21/100 Snort is an open source network-based intrusion detection and prevention system. It operates in 3 major modes Sniffer mode: Reads network packets and displays them on the console @ireteeh @segoslavia @elormkdaniel @THESTREETVOICE3 @DGilcore #100DaysOfCybersecurity
0
0
5
@wildfl0w6r
Bee
26 days
Day 19 of #100DaysOfCyberSecurity @ireteeh @segoslavia Today we had a soft skills session on self-assessment & career growth. Key takeaways: • Your career grows when your self awareness grows. • Build a personal board of directors: mentors, sponsors, & peers who guide 👇🏽
@wildfl0w6r
Bee
27 days
Day 18 of #100DaysOfCyberSecurity @ireteeh @segoslavia Today I learned about file permissions & why they matter in cybersecurity. Permissions decide who can read, write, or run a file, which is important in keeping our data safe There are 3 types of permissions, & they are 👇🏽
5
2
18
@Adanna_techie
Adanna
28 days
network traffic and make decisions or take actions based on the entries.
0
0
1
@Adanna_techie
Adanna
28 days
Packet logger mode: Logs packets into a file for later analysis IDS/IPS mode: actively monitors network traffic against defined rules and can take actions to prevent potential intrusion. Rules are the main core of how Snort operates. Snort rules allow the system to inspect
1
0
1