Rajneesh Gupta
@rajneeshg7
Followers
2K
Following
349
Media
534
Statuses
2K
Zero to CyberHero ๐Coach | Mission to help 100k people get to Cybersecurity by 2025 | Follow for Career tips
๐
Joined July 2016
๐๐๐ ๐๐ญ๐๐ฉ๐ฌ ๐ญ๐จ ๐๐ซ๐๐๐ค ๐ข๐ง๐ญ๐จ ๐๐ฒ๐๐๐ซ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒย ๐ Many of you asked me about the practical and effective approach to getting into a Cybersecurity career. So, here it is. I've finally made it public. This is the framework I've been using to help hundreds
2
1
13
๐๐ข๐ง๐ฎ๐ฑ ๐๐จ๐ ๐๐ง๐๐ฅ๐ฒ๐ฌ๐ข๐ฌ - Home Lab โญ Access the Home-Lab: https://t.co/BGCUqacjy0
1
0
5
๐งโ๐ป๐ฅ[Malware Analysis Home-Lab v1.0]๐ฅ๐ฉโ๐ป Malware analysis is the process of dissecting and studying malicious software (malware) to understand how it works, what it does, and how to defend against it. If youโre a SOC Analyst or Aspirant SOC Analyst, this list will help you.
0
0
2
๐ฑ๐ฅ[๐๐๐ ๐๐๐๐๐๐ซ ๐๐๐๐ - ๐๐จ๐ฆ๐ ๐๐๐]๐ฅ๐ฉโ๐ป This is the powerful home-lab focused on setting up IBM QRadar SIEM and real-world use cases. If youโre interested to become SOC Analyst(Tier 1/2) , this lab will help you with SOC tools, rules, queries, apps and
0
1
1
๐๐ ๐๐ก๐๐ฌ๐๐ฌ ๐จ๐ ๐๐ญ๐ก๐ข๐๐๐ฅ ๐๐๐๐ค๐ข๐ง๐ ๐ โก๏ธPlanning and Reconnaissance: Understanding the target and its vulnerabilities through information gathering. โญTechniques: Open Source Intelligence (OSINT), footprinting, social media analysis. โก๏ธScanning: Actively
0
0
1
๐๐๐๐ฌ๐ฌ ๐ฒ๐จ๐ฎ๐ซ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐๐ฑ๐๐ฆ๐ What type of attack involves an attacker putting a layer of code between an original device driver and the operating system? A.ย ย ย Refactoring B.ย ย ย Trojan horse C.ย ย ย Shimming D.ย ย ย Pass the hash
1
0
0
๐ ๐ฅ[๐๐ ๐๐ข๐ซ๐๐ฌ๐ก๐๐ซ๐ค ๐
๐ข๐ฅ๐ญ๐๐ซ๐ฌ ๐๐จ๐ซ ๐๐๐ฅ๐ฐ๐๐ซ๐ ๐๐๐ญ๐๐๐ญ๐ข๐จ๐ง๐ฌ]๐ฅ๐ Display filters in Wireshark allow you to focus on specific types of network traffic. In this list, Iโll share 10 Most important Wireshark Filters to detect Malicious traffic. If youโre
0
0
1
๐ฅ[๐๐๐ ๐๐๐ ๐๐จ๐ฆ๐ฉ๐ฅ๐ข๐๐ง๐๐- ๐๐ ๐๐๐ช๐ฎ๐ข๐ซ๐๐ฆ๐๐ง๐ญ๐ฌ]๐ฅ If you are a GRC analysts or Security analyst or aspirant SOC analyst, knowledge of PCI DSS compliance will help you excel in your career path. #CyberSecurity
0
0
3
โญ๏ธ Sandbox โข Any Run https://t.co/WtR9vR0rYI โข Palo Alto Wildfire https://t.co/bLNp7RhoMe โญ๏ธ Discover other infected endpoints โข Osquery https://t.co/Sq6v6EKeFc โข Windows Defender for endpoint
0
0
2
โญ๏ธCheck for the known adversaries โข MITRE ATT&CK Groups https://t.co/43Rc9vNxve โญ๏ธTraffic Analysis โข Wireshark https://t.co/c7NQmDb0QQ โข tshark
wireshark.org
Wireshark: The world's most popular network protocol analyzer
1
0
1
๐๐ซ๐๐๐ค ๐ฒ๐จ๐ฎ๐ซ ๐๐ฒ๐๐๐ซ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ง๐ญ๐๐ซ๐ฏ๐ข๐๐ฐ ๐ฐ๐ข๐ญ๐ก ๐๐] Question: What is IDS and IPS? And how are they different? ๐ดWatch the Full Video https://t.co/UPP0DIyXkM ๐ Retweet if youโve found this useful
0
0
1
Quick test๐ Which tool can be used to detect SQL Injections from Server logs? #CyberSecurity
1
0
0
You will rarely find this interview question but itโs worth knowing it..
0
0
0
Learned Hacking - but failed to get cybersecurity job then do this๐
0
0
1