
Agent Logan
@AgntLgn
Followers
407
Following
13K
Media
246
Statuses
7K
InfoSec Knight, P2V Evangelist, Cloud Ninja, Script Baker & Gamer. Top 1% THM | Tweets are my own. (Opinions = Mine)
Texas, USA
Joined April 2009
I just completed Billing room on TryHackMe. Some mistakes can be costly. #tryhackme via @realtryhackme.
tryhackme.com
Some mistakes can be costly.
0
0
0
I just completed Reset room on TryHackMe. This challenge simulates a cyber-attack scenario where you must exploit an Active Directory environment. #tryhackme via @realtryhackme.
tryhackme.com
This challenge simulates a cyber-attack scenario where you must exploit an Active Directory environment.
1
0
1
I just completed Identification & Scoping room on TryHackMe. A look into the second phase of the Incident Response Framework, Identification & Scoping. #tryhackme via @realtryhackme.
tryhackme.com
A look into the second phase of the Incident Response Framework, Identification \u0026 Scoping.
0
0
0
I just completed AD: Authenticated Enumeration room on TryHackMe. Explore how to breach and enumerate Active Directory with an authenticated account. #tryhackme via @realtryhackme.
tryhackme.com
Explore how to breach and enumerate Active Directory with an authenticated account.
0
0
0
RT @I_Am_Jakoby: 2 things my friends. 1. if my content has helped you in any way please consider leaving a testimonial here:..
0
26
0
I just completed AD: Basic Enumeration room on TryHackMe. Learn how to enumerate an Active Directory network and get initial access. #tryhackme via @realtryhackme.
tryhackme.com
Learn how to enumerate an Active Directory network and get initial access.
0
0
0
RT @vxunderground: Holy shit, dude. Zeekill got his own HBO documentary. This guy was a serial swatter and part of Lizard Squad. This guy….
0
237
0
I just completed CORS & SOP room on TryHackMe. Cross-Origin Resource Sharing and Same-Origin Policy. #tryhackme via @realtryhackme.
tryhackme.com
Cross-Origin Resource Sharing and Same-Origin Policy.
0
0
0
I just completed CSRF room on TryHackMe. Learn how a CSRF vulnerability works and methods to exploit and defend against CSRF vulnerabilities. #tryhackme via @realtryhackme.
tryhackme.com
Learn how a CSRF vulnerability works and methods to exploit and defend against CSRF vulnerabilities.
0
0
1
Share your achievement #tryhackme via @realtryhackme.
tryhackme.com
Start your Windows monitoring journey by learning how to use key system logs to detect threats.
0
0
0
RT @I_Am_Jakoby: I finished early and added another tool to my website!.➡️ This tool allows you to hide any payload….
0
83
0
RT @ZEDSHOTofficial: BF6 Phantom Edition Codes!. Over 500 Codes to Giveaway. Winners announced this weekend Good Luck!. How to Enter:.Follo….
0
5K
0
Share your achievement #tryhackme via @realtryhackme.
tryhackme.com
Apply current authentication models employed in modern environments to a red team approach.
0
0
0
Share your achievement #tryhackme via @realtryhackme.
tryhackme.com
Explore key metrics driving SOC effectiveness and discover ways to improve them.
0
0
0
RT @BugBountyDEFCON: To celebrate our badge launch, we're giving away FIVE free 6-month licenses to @pentesterlab. ✅ Comment BADGELIFE and….
0
307
0
RT @theXSSrat: 🚨 GIVEAWAY ALERT 🚨 Want lifetime access to my All-Inclusive Cybersecurity Mastery Bundle? 🐀 Learn XSS, IDOR, Burp Suite & mo….
0
73
0
Share your achievement #tryhackme via @realtryhackme.
tryhackme.com
Learn about DOM-based vulnerabilities that can be leveraged to stage client-side attacks!
0
0
0