darkN3ght
@three_cube_jr
Followers
45
Following
1K
Media
30
Statuses
343
He is @callgh0st
root
Joined April 2023
π₯ Unveiling the untold power of '*' in Linux: My rm -rf * mishap left me speechless π± Learn from my experience and explore the impact of this command in my latest article. Don't miss out on this cautionary tale! Read now: https://t.co/sP7TIyRQx8
#Linux #Cautionary #TechLearning
infosecwriteups.com
In the world of Linux, few symbols wield as much power as the β*β. This seemingly innocuous wildcard character can turn from friend to foeβ¦
1
2
3
π Unlock the Secrets of Successful Pentesting! Dive into the core pillar of Reconnaissance and discover how it powers effective cyber attacks and cyber defense. Don't miss out on the vital insights! https://t.co/uyzRa6kfDa
#Pentesting #CyberSecurity #ReconnaissanceMatters π‘οΈ
callgh0st.medium.com
In numerous real-world instances such as the attacks by Lockbit ransomeware Group, the power of reconnaissance in successful cyberattacksβ¦
0
0
1
π³π¬ Happy Independence Day, Nigeria! π This October also marks the start of Cybersecurity Awareness Month, a crucial time to recognize the importance of securing our digital world. ππ #CybersecurityAwarenessMonth #IndependenceDay #SecOpsTalents
0
3
9
Embark on a thrilling journey into the world of ethical hacking! π΅οΈββοΈ Discover secrets and uncover vulnerabilities in the "Pickle Rick" TryHackMe challenge.Dive into my comprehensive guide to hacking adventures: ππ https://t.co/jb5lWEz9M4
#EthicalHacking #TryHackMe
infosecwriteups.com
By entering `ls`, I listed directories and files, revealing a file named βSup3rS3cretPickl3Ingred.txt.ββ¦
0
0
1
0
0
0
The CIA triad is a cornerstone of information security. It helps organizations protect their information assets from a wide range of threats. Learn more about the CIA triad and its importance in my latest article: https://t.co/D6pYN7qnyj
#CIA #infosec
callgh0st.medium.com
The CIA triad is a foundational model for information security that has been widely adopted by organizations of all sizes. It consists ofβ¦
0
1
1
It's hard to keep up when you're expecting a particular output you're having something else. I was solving one lesson in @OWASP_WebGoat and I spent hours trying to solve it and I was about to give up then I saw what I was missing. We have to keep trying bro. #keepitup
They say try harder, but this is on another level, all my labs are good to go and instead of SUCCESS , it been FAILED, I guess i will just keep the note, #SMBrelayattack
1
0
1
New article: Webgoat Solution: Guessing and Predicting Patterns (Insecure Direct Object References). Learn how to exploit this vulnerability in a tutorial with screenshots. https://t.co/y1MTcZRCHI
callgh0st.medium.com
Then, paste the alternate path you copied. In my case, it is /WebGoat/IDOR/profileSectionΒ β¦..
0
0
2
I have a better understanding of what @three_cube said : you can't just hack a system in seconds/minutes like the way it's displayed in movies. Hacking is a process. @three_cube
I thought information gathering is easy. Info gathering isn't easyπππ. Spent more than 30 hours gathering information (passive and active) about an organisation. This is my first time π¬. It was a stressful process. An add-on to my experience ππ―. #information #active #nmap
1
1
3
I thought information gathering is easy. Info gathering isn't easyπππ. Spent more than 30 hours gathering information (passive and active) about an organisation. This is my first time π¬. It was a stressful process. An add-on to my experience ππ―. #information #active #nmap
0
0
1
Using Nmap's scan timing options (-T1, -T2, -T3, -T4, -T5) is like choosing HTML headings: -T1 is the 'subtle whisper,' -T5 is the 'bullhorn,' and -T3 is the 'Goldilocks' 'just right' level. π #NmapHumor #TechFun
1
0
1
TCP- 22 sec UDP-391 sec When scanning for UDP ports with tools such as nmap, it can take a bit longer as UDP does not have a response for lost packets or closed ports. Nmap simply waits a specified time, and if no response is returned, it assumes the port is closed.@three_cube
0
4
10
π Just wrapped up my exams and back in action! πβ¨ π§ Exploring the OS debate: #Linux vs. #Windows vs. #macOS π€ π‘ Discover the pros, cons, and find your perfect fit! π₯οΈ π Check out my latest article: https://t.co/thxBFhyp12
#TechTalk #OperatingSystems #TechEnthusiast π
callgh0st.medium.com
Linux, Windows, and macOS are the three most popular operating systems in the world. Each has its own strengths and weaknesses, making itβ¦
0
0
1
@three_cube_jr @RedHatPentester @trisfromthemoon @ireteeh The key word here is consistency!!! If you're consistent, trust me, you won't recognise yourself in 6 months. The growth will be massive. Come back to this tweet in January, you'll see what I'm saying.
1
1
2
#Cyblack2023 was great ππ― Thanks @_aligorithm
Special guest presentation on the topic "From research to reality : Translating Innovation into Practical Cybersecurity solutions" from Louise Cushnahan . #CyBlack2023 #CyberSecurity
1
2
4
(7/7) Here's to pushing past challenges, seeking growth, and forging connections within the #cybersecurity community, specifically in the red team/pentesting field.
0
0
0
(6/7) @RedHatPentester, @_aligorithm, @trisfromthemoon, @ireteeh I admire your knowledge and dedication to #cybersecurity. I'd be honored to learn from you and receive guidance as I navigate this journey. πππ
3
0
0
(5/7) To the amazing individuals in the #cybersecurity world, I've seen your expertise and passion shine through your posts. You've inspired me to keep going. Today, I'm taking a step of faith and tagging a few of you who I think could potentially be great mentors.
1
0
0