continued
DAY 23:
Learning Objectives
- Learn the basics of AWS accounts.
- Enumerate the privileges granted to an account, from an attacker's perspective.
- Familiarise yourself with the AWS CLI.
https://tryhackme.com/room/cloudenum-aoc2025-y4u7i0o3p6
DAY 23:
Learning Objectives
- Learn the basics of AWS accounts.
- Enumerate the privileges granted to an account, from an attacker's perspective.
- Familiarise yourself with the AWS CLI.
https://tryhackme.com/room/cloudenum-aoc2025-y4u7i0o3p6
TryHackMe
AWS Security - S3cret Santa
Learn the basics of AWS enumeration.
❤4⚡3
the last day
DAY 24:
Learning Objectives
- Understand what HTTP requests and responses are at a high level.
- Use cURL to make basic requests (using GET) and view raw responses in the terminal.
- Send POST requests with cURL to submit data to endpoints.
- Work with cookies and sessions in cURL to maintain login state across requests.
https://tryhackme.com/room/webhackingusingcurl-aoc2025-w8q1a4s7d0
DAY 24:
Learning Objectives
- Understand what HTTP requests and responses are at a high level.
- Use cURL to make basic requests (using GET) and view raw responses in the terminal.
- Send POST requests with cURL to submit data to endpoints.
- Work with cookies and sessions in cURL to maintain login state across requests.
https://tryhackme.com/room/webhackingusingcurl-aoc2025-w8q1a4s7d0
TryHackMe
Exploitation with cURL - Hoperation Eggsploit
The evil Easter bunnies operate a web control panel that holds the wormhole open. Using cURL, identify the endpoints, send the required requests, and shut the wormhole once and for all.
❤4👍1
kid cyber
the last day DAY 24: Learning Objectives - Understand what HTTP requests and responses are at a high level. - Use cURL to make basic requests (using GET) and view raw responses in the terminal. - Send POST requests with cURL to submit data to endpoints.…
i didn't manage to complete it on time but i just finished it anyways and we got our certificate🎉
i have learned so many things from day one onwards as i told u it is best for beginners to have basic understanding of some of the things in the field some of the topics were
- the concept of authentication and authorization
- Insecure Direct Object References (IDORs)
- malware analysis
- the basics of network service discovery with Nmap
- how XSS works
- phishing emails
- encoding/decoding
- race conditions
- HTTP requests and responses are at a high level.
i have learned so many things from day one onwards as i told u it is best for beginners to have basic understanding of some of the things in the field some of the topics were
- the concept of authentication and authorization
- Insecure Direct Object References (IDORs)
- malware analysis
- the basics of network service discovery with Nmap
- how XSS works
- phishing emails
- encoding/decoding
- race conditions
- HTTP requests and responses are at a high level.
🔥12👏3❤1
Rob Stack chat
yah man esp in finals week
Everything is interesting and good during final weeks 😭
😢11
Forwarded from Ge'ez Tech® ግዕዝ ቴክ
#Resource
Here is Free Bug Bounty Resource By the Legend Bug Hunter Gal Nagli who has made $2,000,000+.
https://www.wiz.io/bug-bounty-masterclass
#geeztech @geeztechgroup @geezsecurity
Here is Free Bug Bounty Resource By the Legend Bug Hunter Gal Nagli who has made $2,000,000+.
https://www.wiz.io/bug-bounty-masterclass
#geeztech @geeztechgroup @geezsecurity
wiz.io
Bug Bounty Masterclass | Wiz
Learn the fundamentals of bug bounty hunting and earn your certificate by solving hands-on challenges.
❤3
Forwarded from 4-3-3 ስፖርት በኢትዮጵያ™ (𝙻𝚎𝚖𝚒)
የቀድሞው የስፔን አሰልጣኝ ሮበርት ሞሬኖ በchatGPT ላይ ከፍተኛ ጥገኝነት ካሳዩ በኋላ FC Sochi ከስራ ተባረዋል።
ክለቡ ለስልጠና ክፍለ ጊዜዎች፣ ለታክቲካል እቅድ እና ለዝውውር… እንዲሁም ተጫዋቾችን ለ28 ሰዓታት እንዳይተኙ የማድረግ እቅድን ጨምሮ አንዳንድ እንግዳ ሀሳቦችን እንደሚጠቀም አረጋግጧል።
(ምንጭ፡ beINSPORTS)
@Bisrat_sport_433et @Bisrat_sport_433et
ክለቡ ለስልጠና ክፍለ ጊዜዎች፣ ለታክቲካል እቅድ እና ለዝውውር… እንዲሁም ተጫዋቾችን ለ28 ሰዓታት እንዳይተኙ የማድረግ እቅድን ጨምሮ አንዳንድ እንግዳ ሀሳቦችን እንደሚጠቀም አረጋግጧል።
(ምንጭ፡ beINSPORTS)
@Bisrat_sport_433et @Bisrat_sport_433et
😁6
Forwarded from Buna Byte Cybersecurity
THE LONG AWAITED ANNOUNCEMENT IS HERE 🔥
The most intensive Cybersecurity training in Ethiopia BBJST Batch 04 is officially open for registration. 🛡💻
You’ve been asking for it. Now it’s here. This is your chance to stop being a spectator and start becoming a Junior Security Tester.
Why now?
✅ High-demand skill set
✅ Practical, lab-based learning
✅ Limited seats for maximum focus
Stop waiting for the "perfect time." The perfect time is now.
🚀 REGISTER BEFORE SLOTS FILL UP: 👉 bunabyte.com/bbjst
@bunabytecs
The most intensive Cybersecurity training in Ethiopia BBJST Batch 04 is officially open for registration. 🛡💻
You’ve been asking for it. Now it’s here. This is your chance to stop being a spectator and start becoming a Junior Security Tester.
Why now?
✅ High-demand skill set
✅ Practical, lab-based learning
✅ Limited seats for maximum focus
Stop waiting for the "perfect time." The perfect time is now.
🚀 REGISTER BEFORE SLOTS FILL UP: 👉 bunabyte.com/bbjst
@bunabytecs
❤2
kid cyber
https://github.com/KidM13/Key-logger#
i know it is simple code but it helps to understand how does a key logger actually works
a Keylogger is a program that tracks keyboard input
i used pynput python library to deal with the input that comes from both mouse movement and keyboard
main.py is for key logger
control.py is for the purpose of controlling a mouse and keyboard
listen.py to listen for mouse movement
log.txt to store the tracks of the keyboard
test it and share ur idea on it
a Keylogger is a program that tracks keyboard input
i used pynput python library to deal with the input that comes from both mouse movement and keyboard
main.py is for key logger
control.py is for the purpose of controlling a mouse and keyboard
listen.py to listen for mouse movement
log.txt to store the tracks of the keyboard
test it and share ur idea on it
👍11