Segun
@sudosheggs
Followers
322
Following
5K
Media
99
Statuses
661
God First 💭| ethical hacking in progress | pentester in training. sharing my journey in cybersecurity, tools and tactics. gymxtech= discipline.
Root
Joined April 2022
with tears of Joy in my eyes 😭😭🤩🤩 Thank you for the amazing update @Cyblackorg . I’m pleased to have advanced to the next stage of the internship process and appreciate the opportunity, i look forward for what comes next. Thank you Dr @ireteeh , @segoslavia @TemitopeSobulo
19
7
55
☑️ day 61/100 of my cybersecurity journey. completed the cryptography and endpoint protection exams. #100DaysOfCyberSecurity. @ireteeh @TemitopeSobulo @segoslavia @OnijeC @cyberjeremiah @real_nuelOj @h4ruk7
2
7
16
Hello Cyber friends in Nigeria, if you need internet data to support your learning, fill this form. https://t.co/qJvUs3G9zK The form will be closed once we hit our target. Your information will be deleted within 48 hours…
docs.google.com
Kindly note that this is only for those in NIGERIA
61
35
187
☑️ day 60/100 of my cybersecurity journey. knocked off modules 24> technologies and protocols. #100DaysOfCyberSecurity
@ireteeh @TemitopeSobulo @OnijeC @segoslavia @cyberjeremiah @h4ruk7 @real_nuelOj
1
3
14
endpoint vulnerability assessment is a process used to find and fix security weaknesses on endpoint devices such as computers, servers, phones, and tablets. It helps ensure that attackers cannot exploit these devices to gain access to the network.
0
0
0
☑️ day 58-59 / 100 of my cybersecurity journey. knocked off modules 23> endpoint vulnerability assessment.#100DaysOfCyberSecurity
@ireteeh @TemitopeSobulo @segoslavia @OnijeC @cyberjeremiah @real_nuelOj @h4ruk7
2
4
14
OSINT 109: LinkedIn Recon In this video, I share a simple manual technique you can use to extract data like "pictures, mutual connections, contact info" - etc from a POI on LinkedIn > Inspect. #OSINT #Cybersecurity
0
51
347
Facts 👏🏿
For 2 years, cybersecurity wasn’t my career. it was my hobby, and that experience has shaped me in incredible ways. But this is the part many people never talk about. I didn’t start with a high-paying role. I started with volunteering one of which was with @Cyblackorg, an
1
0
1
☑️ day 57/100 of my cybersecurity journey. knocked off modules 22> endpoint protection #100DaysOfCyberSecurity
@ireteeh @TemitopeSobulo @OnijeC @segoslavia @cyberjeremiah @h4ruk7 @real_nuelOj
1
2
11
☑️ day 56/100 of my cybersecurity journey. knocked off modules 21> cryptography #100DaysOfCyberSecurity
@ireteeh @TemitopeSobulo @OnijeC @segoslavia @cyberjeremiah @real_nuelOj
2
0
5
May the Lord direct our steps this month. Happy new month 🥰🥰🥰
7
8
30
☑️ day 55/100 of my cybersecurity journey. knocked off modules 20> threat intelligence #100DaysOfCyberSecurity
@ireteeh @TemitopeSobulo @OnijeC @segoslavia @cyberjeremiah @h4ruk7
2
3
17
This was a great session. Thank you, Sir @cyber_rekk , your speech was truly mind blowing and insightful..I really appreciate it, and I don’t take it for granted. thank you Sir @cyberjeremiah for great session.
1
2
12
I found malware that embedded itself into an audio driver. It silently recorded from the system microphone and uploaded the compressed .wav files every 20 minutes. Using memory forensics and strings, I discovered a hidden process writing to a staged audio cache in %Temp%.
357
1K
13K
OSINT 106: Who Owns This Email? In this video, I made a quick demo using different methodology and tools to build a richer profile of my target email address > advanced search operators > data aggregation > Google > Bing > Yandex, etc. #OSINT #Cybersecurity
0
109
736