fixitgearware Profile Banner
FixitGearWare-Security Profile
FixitGearWare-Security

@fixitgearware

Followers
283
Following
300
Media
263
Statuses
1K

An organization that offers Cyber Security news & services, Information Security training, threat and vulnerability Assessment, web-app development.© 2019-2023.

Joined December 2019
Don't wanna be here? Send us removal request.
@fixitgearware
FixitGearWare-Security
5 months
Hello Social Family, we just dropped the video of our first penetration testing course. Please do watch the entire video, as lot's of insight was shared for free, that keeps you grounded to hunting IDOR Vulnerabilities. In the Free Course, you would be learning the following:
1
2
6
@fixitgearware
FixitGearWare-Security
22 hours
In the Second Series of our Building Tool Concept, we explained the details of our code in the DNS Auto Recon Tool. Showcasing the tool having the ability to:. ✅ Resolve DNS Information for Single Domain, Multiple Domains, or Domains in a text file. ✅ Filtering gibberish.
0
1
1
@fixitgearware
FixitGearWare-Security
1 day
Teaser of this Month's Coding & Building Tools in Cybersecurity. Video Drops Sunday morning US time. #FixitGearWare #Security #Building #Tools #Projects #RedTeaming
0
1
2
@fixitgearware
FixitGearWare-Security
3 days
"CODING AND TOOL BUILDING SERIES WITH FIXITGEARWARE SECURITY" still holds this week. Video drops as usual, Saturday night US time zone. #Fixitgearware #Security #Coding #RedTeaming
0
0
1
@fixitgearware
FixitGearWare-Security
4 days
SECURITY TIPS OF THE DAY, TODAYS TIPS IS SHOWING YOU THE CONCEPT OF HOW THINGS WORKS USING SHODAN AS AN EXAMPLE:. 1. Have the IP address of your target ? launch your Kali Linux and use the whois tool, to lookup the target domain records. 2. Check the CIDR range and value of the.
0
1
3
@fixitgearware
FixitGearWare-Security
5 days
Every day organization’s receive thousands of resumes, with professional certifications (e.g. OSCP, COMPTIA, CCNA, EJPT, OSWE etc.) originating from the same cybersecurity certification bodies— submitted by these job seekers . Therefore, it is imperative that you supplement.
0
0
1
@fixitgearware
FixitGearWare-Security
5 days
10. And the most important excellence of staring on your journey, is to learn how to build projects in containers and deploy them.
1
0
0
@fixitgearware
FixitGearWare-Security
5 days
9. Working with AI between a containerization tool can be very dangerous, especially when it comes to data related to AI bias, and malicious codes. Learn how to not grant permission to AI within the containerization. Learn about “Environment Variables” and how it is setup.
Tweet media one
1
0
0
@fixitgearware
FixitGearWare-Security
5 days
8. Learn various types of PowerShell applications and how to switch between the preferred, within the GUI when working with containerization tool. (Think deeply there is something we are trying to communicate here).
Tweet media one
1
0
0
@fixitgearware
FixitGearWare-Security
5 days
7. Learn the difference between rebooting a containerization tool (i.e. docker, Kubernetes etc.), and a specific container (e.g. my-container01) using CMD prompts.
Tweet media one
1
0
0
@fixitgearware
FixitGearWare-Security
5 days
6. Learn how to apply the appropriate PowerShell update within the GUI of these containerization tooling.
Tweet media one
1
0
0
@fixitgearware
FixitGearWare-Security
5 days
5. Learn how CMD prompts works within the GUI, and how to enable them. ( Understanding how to work within the GUI of containerization tooling, portrays excellence and skillset).
Tweet media one
1
0
0
@fixitgearware
FixitGearWare-Security
5 days
4. Learn how to apply update and patches from the GUI’s of these various containerization tool.
Tweet media one
1
0
0
@fixitgearware
FixitGearWare-Security
5 days
3. Learn, how to integrate and interact with the Desktop application and web-login interface of these containers especially from a security standpoint, to avoid clicking a phishing link (think deeply there is something we are trying to communicate here as well).
Tweet media one
1
0
0
@fixitgearware
FixitGearWare-Security
5 days
2. Learn how to research about updates and patches for the various containerization tool you will be working with, before applying them. This is crucial, as most of your testing would be on container versioning. How can you test what you don’t know how it works ? (think deeply
Tweet media one
1
0
0
@fixitgearware
FixitGearWare-Security
5 days
CYBERSECURITY TIP OF THE DAY: TODAY’S TIP COVERS THE BASICS OF GETTING STARTED IN CYBERSECURITY, USING CONTAINER TOOLS AS A BEGINNER PROJECT:. Aside soft skills, hands-on and technical experience are a proactive requirements when it comes to getting a job in cybersecurity.
Tweet media one
1
0
2
@fixitgearware
FixitGearWare-Security
8 days
This Month’s Episode on WebDev-Security with FixitGearWare Security, just got published on YouTube. What You’ll Learn:. • How to complete the upgrade of phpMyAdmin 5.2.2 configurations, this concept is replicable across any version of PhpMyAdmin Upgrade. • Properly
Tweet media one
0
0
2
@fixitgearware
FixitGearWare-Security
9 days
And hey please if you stumble upon our page, just hit that follow button. That helps us to grow, inspire, and share the knowledge in our possession with others. #RedTeam #Cybersecurity #trending #RedSox #WilliamEstFanconD1
0
0
1
@fixitgearware
FixitGearWare-Security
9 days
SHORT WRITE UP ON SOLVING THE HTB-VOUCHER:. The concept of the story is a subtle mimic of Treasure Hunting by ancient Pirates. So, let’s break it down. First sentence:.In ancient mythology, treasure maps "aHR0cHM6Ly90aW55dXJsLmNvbS80dXU2c2hhbQ==" were notoriously complex to.
@fixitgearware
FixitGearWare-Security
15 days
In ancient mythology, treasure maps "aHR0cHM6Ly90aW55dXJsLmNvbS80dXU2c2hhbQ==" were notoriously complex to decipher in order to obtain hidden treasures. This was possible due to the complex encoding designed by the captain who hid these treasures, intending they should never be.
2
0
2
@fixitgearware
FixitGearWare-Security
9 days
Cheat Sheets are cool, and always interesting. Nonetheless, when you copy made rules and not understand how the tools designed to execute such rules works—It becomes nothing but using the same thing others are using and being in the same box others are “Hunting for the same
0
0
1
@fixitgearware
FixitGearWare-Security
10 days
While there numerous of technicalities from the archives of FixitGearWare Security, these are just Afew stats, of what to look out for when building a website or intending to build one for your client. To Learn more about Website Development with Frameworks such as Laravel, be.
0
0
0