RedHatPentester Profile Banner
Nana Sei Anyemedu Profile
Nana Sei Anyemedu

@RedHatPentester

Followers
33K
Following
25K
Media
618
Statuses
18K

Black Excellence | Amanfo) | Penetration Testing | Digital Forensics & Investigations | Offensive Security | Security Researcher | Writer | Man United❤

Saint Petersburg, Russia
Joined January 2021
Don't wanna be here? Send us removal request.
@RedHatPentester
Nana Sei Anyemedu
1 month
FOR EDUCATIONAL-PURPOSE ONLY Yesterday, @CaptainSmart_tv made a statement that I believe many Ghanaians overlooked and it’s worth paying close attention to. Our National Security, Police and National Signals Bureau have the capability to track anyone simply through their
50
119
444
@RedHatPentester
Nana Sei Anyemedu
18 hours
The SILENT WITNESS ON YOUR COMPUTER WAITING FOR YOU TO GET INTO TROUBLE. Most people believe that deleting a folder, clearing recent files, or wiping their history is enough to hide their tracks on a computer. What they don’t realize is that Windows quietly keeps a hidden
342
2K
11K
@distractivexyz
Distractive
5 days
Web3 PR isn’t what it used to be. It’s evolving in real time. Most startup “PR strategies” only add to the noise & lose brand credibility. On Nov 13, we’re breaking down the framework that actually works. 📅 FREE 30-min webinar
0
2
8
@RedHatPentester
Nana Sei Anyemedu
4 hours
0
0
0
@RedHatPentester
Nana Sei Anyemedu
5 hours
0
0
2
@RedHatPentester
Nana Sei Anyemedu
7 hours
Let me hit on two. Shellbags can expose lies because they quietly record every folder a user has opened on a Windows computer, even if the person later deletes those folders to hide them. This means someone might claim they never accessed a certain location but the shellbags can
@CZynova78488
Azino Oreva
12 hours
@RedHatPentester No wahala. But what kind of trouble.
1
3
24
@RedHatPentester
Nana Sei Anyemedu
16 hours
Imagine you have a folder on your computer called “Money.” You open it a few times and later you delete it, thinking it is gone forever. But here is the truth: Even though the Money folder itself is deleted. Windows secretly keeps a memory that the folder existed and that you
@AfricanComNotes
African Community Notes
16 hours
@RedHatPentester If you are not too busy, please explain this for lay men. Suppose the folder is named Money and it's deleted. What reflects in the shell bag? Just the folder name and when it was accessed minus the actual folder contents?
5
25
138
@RedHatPentester
Nana Sei Anyemedu
18 hours
The SILENT WITNESS ON YOUR COMPUTER WAITING FOR YOU TO GET INTO TROUBLE. Most people believe that deleting a folder, clearing recent files, or wiping their history is enough to hide their tracks on a computer. What they don’t realize is that Windows quietly keeps a hidden
342
2K
11K
@RedHatPentester
Nana Sei Anyemedu
18 hours
Steganography is the practice of hiding information inside ordinary digital files such as images, audio, video, or even network traffic. Unlike encryption which makes data unreadable but obvious steganography makes the data invisible altogether. An image, song, or video looks
7
51
226
@RedHatPentester
Nana Sei Anyemedu
2 days
The only time devs will call you boss or chairman is when you discover logic flaws in an application scheduled for deployment in few hours😂😂. It didn’t occur to you to involve security in the initial stages; I’ll teach you a lesson you’ll never forget.
1
2
12
@RedHatPentester
Nana Sei Anyemedu
3 days
What @T3chFalcon posted is true on WiFi. Let me go deep. In digital forensics, WiFi history essentially becomes a passive, long-term location log, created automatically, difficult to tamper with, and highly reliable when corroborated with other evidence. Every Windows machine
2
11
56
@RedHatPentester
Nana Sei Anyemedu
4 days
It’s a myth that a burner phone provides true anonymity in a forensic investigation. Every device registered or not creates radio fingerprints by connecting to nearby cell towers. Tower handshakes generate Call Detail Records (CDRs) containing timestamps, signal strength, and
5
15
97
@RedHatPentester
Nana Sei Anyemedu
4 days
Deleted files on an SSD are often permanently gone. TRIM actively wipes data blocks the moment they’re marked deleted while Garbage collection cleans up in the background without warning. The Wear leveling scatters your data, hiding traces from forensic tools. Many drives use
5
21
186
@zachxbt
ZachXBT
5 days
@coffeebreak_YT Mumu ogun thunderstrike you and your family David
634
100
2K
@RedHatPentester
Nana Sei Anyemedu
6 days
Meka Ƒe dzedze vie lo? Toboli Nye nutɔ dzedze vie lo? Toboli Ne ga gble hă nye dzi Toboli Ne ganyo hă nye dzi Toboli Mega favi le ză me nam oo Mega favi le ză me nam oo Nane naxɔ gbe la siwò nam lo Devinye lo Toboli
1
1
15
@RedHatPentester
Nana Sei Anyemedu
6 days
As attackers shift to fileless and in-memory malware, investigators need faster ways to expose injected code and rogue processes. Don’t Let Fileless Malware Slip By.
3
6
76
@RedHatPentester
Nana Sei Anyemedu
9 days
WhatsApp End-to-End Encryption vs. Forensic Extraction Although WhatsApp uses end-to-end encryption to protect messages, calls, and shared media during transmission, this protection only applies while the data is moving between devices. Once the content reaches the device, it is
107
619
3K
@RedHatPentester
Nana Sei Anyemedu
9 days
During a mobile device forensic examination, GPS coordinates were successfully extracted from WhatsApp messages. These coordinates were linked to specific conversations found in the device’s message database. The recovered location data was then verified using Google Maps and
14
138
533
@RedHatPentester
Nana Sei Anyemedu
7 days
This coach dierr dem for sack am. Ah why😂😂
2
0
13
@RedHatPentester
Nana Sei Anyemedu
7 days
0
0
2
@RedHatPentester
Nana Sei Anyemedu
7 days
DFIR training hosts one of the most comprehensive curated collections of forensic practice materials bringing together high-quality datasets, lab images, and CTF challenges from trusted sources worldwide. The collection includes: 1. Full disk images for hands-on forensic
7
148
565
@RedHatPentester
Nana Sei Anyemedu
5 months
Day 2: I detected 2 foreigners in my locality this evening by capturing their IMSI values: one originating from the Democratic Republic of Congo and the other from Saudi Arabia pinpointing their live cell locations with that of others meaning if you pass through my area and
13
32
172