Preskoči na sadržaj
Korištenjem servisa na Twitteru pristajete na korištenje kolačića. Twitter i partneri rade globalno te koriste kolačiće za analize, personalizaciju i oglase.

Za najbolje sučelje na Twitteru koristite Microsoft Edge ili instalirajte aplikaciju Twitter iz trgovine Microsoft Store.

  • Naslovnica Naslovnica Naslovnica, trenutna stranica.
  • O Twitteru

Spremljena pretraživanja

  • obriši
  • U ovom razgovoru
    Ovjeren akauntZaštićeni tweetovi @
Predloženi korisnici
  • Ovjeren akauntZaštićeni tweetovi @
  • Ovjeren akauntZaštićeni tweetovi @
  • Jezik: Hrvatski
    • Bahasa Indonesia
    • Bahasa Melayu
    • Català
    • Čeština
    • Dansk
    • Deutsch
    • English
    • English UK
    • Español
    • Filipino
    • Français
    • Italiano
    • Magyar
    • Nederlands
    • Norsk
    • Polski
    • Português
    • Română
    • Slovenčina
    • Suomi
    • Svenska
    • Tiếng Việt
    • Türkçe
    • Български език
    • Русский
    • Српски
    • Українська мова
    • Ελληνικά
    • עִבְרִית
    • العربية
    • فارسی
    • मराठी
    • हिन्दी
    • বাংলা
    • ગુજરાતી
    • தமிழ்
    • ಕನ್ನಡ
    • ภาษาไทย
    • 한국어
    • 日本語
    • 简体中文
    • 繁體中文
  • Imate račun? Prijava
    Imate račun?
    · Zaboravili ste lozinku?

    Novi ste na Twitteru?
    Registrirajte se
Profil korisnika/ce thecybermentor
The Cyber Mentor
The Cyber Mentor
The Cyber Mentor
@thecybermentor

Tweets

The Cyber Mentor

@thecybermentor

🤵 Husband | 🇺🇸 Vet | Founder @TCMSecurity | 🎥 YouTuber http://bit.ly/2NVHesu  | 📷 Streamer http://twitch.tv/thecybermentor  | Chat http://discord.gg/REfpPJB 

United States
thecybermentor.com
Vrijeme pridruživanja: veljača 2019.

Tweets

  • © 2020 Twitter
  • O Twitteru
  • Centar za pomoć
  • Uvjeti
  • Pravila o privatnosti
  • Imprint
  • Kolačići
  • Informacije o oglasima
Odbaci
Prethodni
Sljedeće

Idite na profil osobe

Spremljena pretraživanja

  • obriši
  • U ovom razgovoru
    Ovjeren akauntZaštićeni tweetovi @
Predloženi korisnici
  • Ovjeren akauntZaštićeni tweetovi @
  • Ovjeren akauntZaštićeni tweetovi @

Odjava

Blokiraj

  • Objavi Tweet s lokacijom

    U tweetove putem weba ili aplikacija drugih proizvođača možete dodati podatke o lokaciji, kao što su grad ili točna lokacija. Povijest lokacija tweetova uvijek možete izbrisati. Saznajte više

    Vaši popisi

    Izradi novi popis


    Manje od 100 znakova, neobavezno

    Privatnost

    Kopiraj vezu u tweet

    Ugradi ovaj Tweet

    Embed this Video

    Dodajte ovaj Tweet na svoje web-mjesto kopiranjem koda u nastavku. Saznajte više

    Dodajte ovaj videozapis na svoje web-mjesto kopiranjem koda u nastavku. Saznajte više

    Hm, došlo je do problema prilikom povezivanja s poslužiteljem.

    Integracijom Twitterova sadržaja u svoje web-mjesto ili aplikaciju prihvaćate Twitterov Ugovor za programere i Pravila za programere.

    Pregled

    Razlog prikaza oglasa

    Prijavi se na Twitter

    · Zaboravili ste lozinku?
    Nemate račun? Registrirajte se »

    Prijavite se na Twitter

    Niste na Twitteru? Registrirajte se, uključite se u stvari koje vas zanimaju, i dobivajte promjene čim se dogode.

    Registrirajte se
    Imate račun? Prijava »

    Dvosmjerni (slanje i primanje) kratki kodovi:

    Država Kod Samo za korisnike
    Sjedinjene Američke Države 40404 (bilo koje)
    Kanada 21212 (bilo koje)
    Ujedinjeno Kraljevstvo 86444 Vodafone, Orange, 3, O2
    Brazil 40404 Nextel, TIM
    Haiti 40404 Digicel, Voila
    Irska 51210 Vodafone, O2
    Indija 53000 Bharti Airtel, Videocon, Reliance
    Indonezija 89887 AXIS, 3, Telkomsel, Indosat, XL Axiata
    Italija 4880804 Wind
    3424486444 Vodafone
    » Pogledajte SMS kratke šifre za druge zemlje

    Potvrda

     

    Dobro došli kući!

    Vremenska crta mjesto je na kojem ćete provesti najviše vremena i bez odgode dobivati novosti o svemu što vam je važno.

    Tweetovi vam ne valjaju?

    Prijeđite pokazivačem preko slike profila pa kliknite gumb Pratim da biste prestali pratiti neki račun.

    Kažite mnogo uz malo riječi

    Kada vidite Tweet koji volite, dodirnite srce – to osobi koja ga je napisala daje do znanja da vam se sviđa.

    Proširite glas

    Najbolji je način da podijelite nečiji Tweet s osobama koje vas prate prosljeđivanje. Dodirnite ikonu da biste smjesta poslali.

    Pridruži se razgovoru

    Pomoću odgovora dodajte sve što mislite o nekom tweetu. Pronađite temu koja vam je važna i uključite se.

    Saznajte najnovije vijesti

    Bez odgode pogledajte o čemu ljudi razgovaraju.

    Pratite više onoga što vam se sviđa

    Pratite više računa da biste dobivali novosti o temama do kojih vam je stalo.

    Saznajte što se događa

    Bez odgode pogledajte najnovije razgovore o bilo kojoj temi.

    Ne propustite nijedan aktualni događaj

    Bez odgode pratite kako se razvijaju događaji koje pratite.

    The Cyber Mentor‏ @thecybermentor 18. pro 2019.
    • Prijavi Tweet

    (1/?) How to become an ethical hacker, without spending a dollar. A short novel: If you're new to the field of ethical hacking, you must first understand that you need a good set of foundational skills. These include understanding Linux, Networking, and a language like Python.

    23:13 - 18. pro 2019.
    • 751 proslijeđeni Tweet
    • 1.941 oznaka „sviđa mi se”
    • Munjur Alahi Sourav NINPWN Raghad b_ sudip upadhyay XSpyderSC TwitBot Tony Bennett BAD BOY 17
    59 replies 751 proslijeđeni tweet 1.941 korisnik označava da mu se sviđa
      1. Novi razgovor
      2. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (2/?) On top of a technical foundation, you'll likely need to be well rounded in other areas. You should be well-written, as we write tons of reports. You should be personable and able to talk in front of people. Note: you don't have to be an extrovert. Many of us fake this :)

        24 proslijeđena tweeta 182 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      3. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (3/?) With that out of the way, let's talk the foundations: Linux: OverTheWire's wargames , such as Bandit (http://overthewire.org/wargames/bandit/ …), and Linux Journey (https://linuxjourney.com/ ) are a great place to start. Self plug, I have a Linux for Hackers course toohttps://www.youtube.com/watch?v=rZsJieGi8os …

        25 proslijeđenih tweetova 228 korisnika označava da im se sviđa
        Prikaži ovu nit
      4. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (4/?) Python can be learned from resources like CodeCademy (https://www.codecademy.com/ ), edX (https://www.edx.org/learn/python ), Learn Python the Hard Way (https://learnpythonthehardway.org/book/ ), Google (https://developers.google.com/edu/python/ ), and so much more. Honestly, just Google it and focus on Python3 as 2 is EOL

        21 proslijeđeni tweet 177 korisnika označava da im se sviđa
        Prikaži ovu nit
      5. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (5/?) For networking, I would consider starting with Professor Messer's Network+ course (https://www.professormesser.com/network-plus/n10-007/n10-007-training-course/ …). You can expand upon this and learn Cisco related command line by using tools like Packet Tracer (https://www.netacad.com/courses/packet-tracer …) and taking netacad courses from that link

        17 proslijeđenih tweetova 159 korisnika označava da im se sviđa
        Prikaži ovu nit
      6. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (6/?) On to the hacking. Again, you need a good foundation to start. I'm going to be biased here and recommend my 15 hour course on network pentesting to start with your foundations: https://www.youtube.com/watch?v=WnN6dbos5u8 …. This will brush up on Linux, Python, and guide you slowly through it.

        1 reply 16 proslijeđenih tweetova 166 korisnika označava da im se sviđa
        Prikaži ovu nit
      7. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (7/?) Once you're understanding the foundations, it's best to get some practice in. By practice, I mean attack known vulnerable machines and try to exploit them. We call this capture the flag (CTF) hackthebox - https://www.hackthebox.eu/  vulnhub - https://www.vulnhub.com/ 

        1 reply 15 proslijeđenih tweetova 140 korisnika označava da im se sviđa
        Prikaži ovu nit
      8. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (8/?) Additionally, you might want to participate in CTFs for fun and learning. A great website to find out about upcoming CTFs is CTF Time (https://ctftime.org/ ). For hackthebox, start with easy rated boxes. For vulnhub, try working this list:https://www.abatchy.com/2017/02/oscp-like-vulnhub-vms …

        1 reply 13 proslijeđenih tweetova 150 korisnika označava da im se sviđa
        Prikaži ovu nit
      9. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (9/?) An important part of hacking is learning from others. If you're doing hackthebox, try to learn from a team. There are some great channels out there, including: NetSecFocus: https://mm.netsecfocus.com/  TCL: https://discord.gg/Fs76d4Y  My Discord:https://discord.gg/REfpPJB 

        1 reply 16 proslijeđenih tweetova 130 korisnika označava da im se sviđa
        Prikaži ovu nit
      10. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (10/?) Once you're getting comfortable, it's time to start rounding yourself out. To be a good pentester, your skillset should include basic hacking methodology, active directory exploitation, web application pentesting, and wireless pentesting...amongst other things

        1 reply 11 proslijeđenih tweetova 98 korisnika označava da im se sviđa
        Prikaži ovu nit
      11. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (11/?) Let's start with Active Directory. Try to understand the common attacks that exist out there (https://medium.com/@adam.toscher/top-5-ways-i-gained-access-to-your-corporate-wireless-network-lo0tbo0ty-karma-edition-f72e7995aef2 …). If you did the 15 hour course from post #6, you were introduced to these. Build your own lab & try to recreate attacks. There are also people to follow

        16 proslijeđenih tweetova 131 korisnik označava da mu se sviđa
        Prikaži ovu nit
      12. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (12/?) Some of the great content creators for AD pentesting include: @PyroTek3 - https://adsecurity.org/  @harmj0y - https://blog.harmj0y.net/  @_dirkjan - https://dirkjanm.io/  @Haus3c - https://hausec.com/  Do your research and you'll find plenty more.

        1 reply 21 proslijeđeni tweet 151 korisnik označava da mu se sviđa
        Prikaži ovu nit
      13. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (13/?) For web apps, there are an insane # of resources. First, content creators: @NahamSec - https://www.youtube.com/channel/UCCZDt7MuC3Hzs6IH4xODLBw … @stokfredrik - https://www.youtube.com/channel/UCQN2DsjnYH60SFBIA6IkNwg … @TomNomNom - https://www.twitch.tv/tomnomnomuk  Not all inclusive (sorry if I missed you). These should keep you busy for a while.

        1 reply 15 proslijeđenih tweetova 140 korisnika označava da im se sviđa
        Prikaži ovu nit
      14. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (14/?) There are also tons of free training sites: @PortSwigger Academy - https://portswigger.net/web-security  @Hacker0x01 101 - https://www.hackerone.com/hacker101  @Bugcrowd University - https://www.bugcrowd.com/hackers/bugcrowd-university/ … Again, just a start, but should keep you busy.

        1 reply 16 proslijeđenih tweetova 128 korisnika označava da im se sviđa
        Prikaži ovu nit
      15. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (15/?) Once you start to get the basics down, it's best to explore public bug bounty programs and try to enumerate and attack. You might not find anything right away, but you can focus methodology. Those include @Hacker0x01, @Bugcrowd, @intigriti, @SynackRedTeam, and others.

        1 reply 12 proslijeđenih tweetova 102 korisnika označavaju da im se sviđa
        Prikaži ovu nit
      16. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (16/?) Familiarize yourself with web application testing methodologies as well via @owasp. Treat this guide (https://github.com/tanprathan/OWASP-Testing-Checklist …) and the corresponding PDF (https://www.owasp.org/images/1/19/OTGv4.pdf …) as your bible. Read write-ups, such as https://hackerone.com/hacktivity , @disclosedh1, @PentesterLand

        16 proslijeđenih tweetova 119 korisnika označava da im se sviđa
        Prikaži ovu nit
      17. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (17/?) Lastly, learn wireless pentesting. WPA2 personal is pretty straight forward and can be learned via a blog post (https://www.aircrack-ng.org/doku.php?id=cracking_wpa …). WPA2 enterprise can be a little trickier, but again, some blog posts to the rescue: https://n0where.net/targeted-wpa2-enterprise-evil-twin-attacks-eaphammer … https://teckk2.github.io/wifi%20pentesting/2018/08/09/Cracking-WPA-WPA2-Enterprise.html …

        1 reply 15 proslijeđenih tweetova 117 korisnika označava da im se sviđa
        Prikaži ovu nit
      18. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (18/?) Now, this list is not all-inclusive, but a good start. You can learn all of this stuff for free and not spend tons of money on college/certifications, especially if you lack the means to do so. Also, you're welcome to post the resources that helped you w/ these topics.

        9 proslijeđenih tweetova 100 korisnika označava da im se sviđa
        Prikaži ovu nit
      19. The Cyber Mentor‏ @thecybermentor 18. pro 2019.
        • Prijavi Tweet

        (19/?) TCM out.pic.twitter.com/4tNEWJfq8x

        16 replies 6 proslijeđenih tweetova 129 korisnika označava da im se sviđa
        Prikaži ovu nit
      20. Kraj razgovora

    Čini se da učitavanje traje već neko vrijeme.

    Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

      Sponzorirani tweet

      false

      • © 2020 Twitter
      • O Twitteru
      • Centar za pomoć
      • Uvjeti
      • Pravila o privatnosti
      • Imprint
      • Kolačići
      • Informacije o oglasima