Search
TOOLS DON'T MAKE HACKERS, HACKERS MAKE TOOLS. An info sec junkie's professional path. Professional pentester and Red Teamer since October 2018. I love hacking and coding and I hope I can give my little knowledge back to the community and help make information systems more secure. This blog focuses on information security and white hat hacking, i.e. hacking based on the client's authorization. Hacking must be done responsibly: don't ruin people's lives and businesses.
Posts
Showing posts from October, 2017
Contact Form
Tips for an Information Security Analyst/Pentester career - Ep. 31: John The Ripper
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 30: vsFTP 2.3.4 backdoor
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 29: XAMPP and SQL exploitation
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 28: NSE (pt.2)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 27: OSINT (Pt.6)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 26: OSINT (Pt.5)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 25: The importance of grit
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 24: command injection
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 23: Shell from SQL injection
- Get link
- X
- Other Apps