Zuber(@0bin_Cyber) 's Twitter Profileg
Zuber

@0bin_Cyber

Cybersecurity/ML • Junior Security Analyst • Pentesting • Malware RE • Threat Hunting • DevOps • Science • History • Fitness - Alxamdulillah!

ID:1245095998990540801

linkhttps://localhost.com calendar_today31-03-2020 21:10:08

7,2K Tweets

1,2K Followers

335 Following

Zuber(@0bin_Cyber) 's Twitter Profile Photo

Is cybersecurity still relevant? I’m wondering if I should continue pursuing it or switch to a different field, as it seems like it’s been stagnant for the past three years. Let me know your thoughts…

account_circle
Zuber(@0bin_Cyber) 's Twitter Profile Photo

Advent of Cyber 2023 - Day 01: Completed ✅

I have learned new concepts in the field of AI and Cybersecurity such as:

• Natural Language Processing (NLP) which powers modern AI.
• Prompt Injection Attacks - untrusted input into a chatbot.
• Methods to defend against it.

Advent of Cyber 2023 - Day 01: Completed ✅ I have learned new concepts in the field of AI and Cybersecurity such as: • Natural Language Processing (NLP) which powers modern AI. • Prompt Injection Attacks - untrusted input into a chatbot. • Methods to defend against it.
account_circle
John Breth (JB) | CyberInsight® on YouTube(@JBizzle703) 's Twitter Profile Photo

New Hacking Humble Bundle Bundle Giveaway! I'm going to give away 2 bundles. 18 Books including covering topics like...

👽Practical Malware Analysis
👾Bug Bounties
🕸️Hacking Web API's
🛜Securing Networks
🪟Windows Hacking
🐍Python for Pentesters

To win:
🔁Retweet this tweet
🗣️Say…

account_circle
Zuber(@0bin_Cyber) 's Twitter Profile Photo

5/8 Completed (Assets, Threats & Vulnerabilities)! About to start the next one which is, sound the Alarm: 'Detection and Response.'

See you, then!

5/8 Completed (Assets, Threats & Vulnerabilities)! About to start the next one which is, sound the Alarm: 'Detection and Response.' See you, then!
account_circle
Zuber(@0bin_Cyber) 's Twitter Profile Photo

After all the genocides, this is the decision the US government has made? The situation in the US appears to be evolving each day. W a JK

account_circle
Zuber(@0bin_Cyber) 's Twitter Profile Photo

Knocked this one done too... It was super easy and informative, learned so much from the SQL sections, learned so far:

• Computing: OS, Hardware and Software and how they work together.
• The Linux OS / Command Lines
• Also SQL to query information from DB and more...

Knocked this one done too... It was super easy and informative, learned so much from the SQL sections, learned so far: • Computing: OS, Hardware and Software and how they work together. • The Linux OS / Command Lines • Also SQL to query information from DB and more...
account_circle
Zuber(@0bin_Cyber) 's Twitter Profile Photo

Learn Linux Faster with These For Free

Linux basics for hackers OccupytheWeb
THM Linux fundamentals rooms tryhackme.com/module/linux-f…
Linux Journey - (it teaches you in’s and out about Linux / everything) linuxjourney.com
OverTheWire (Bandit CTF) overthewire.org/wargames/bandi…

account_circle
Zuber(@0bin_Cyber) 's Twitter Profile Photo

I've completed the 3rd module (3/8) of the Google Cybersecurity course, where I learned about network architecture and the best methods for securing it against cyber attacks.

• Structure of a network
• Network Operation
• Network Attacks
• And Network Hardening

I've completed the 3rd module (3/8) of the Google Cybersecurity course, where I learned about network architecture and the best methods for securing it against cyber attacks. • Structure of a network • Network Operation • Network Attacks • And Network Hardening
account_circle
John Breth (JB) | CyberInsight® on YouTube(@JBizzle703) 's Twitter Profile Photo

I want to sponsor two folks to take Djax’s Intro to Ethical Hacking!

To win:
✅Say why you want to learn about pentesting
✅Retweet his tweet below

I’ll pick two winners next Friday🤝

account_circle
Zuber(@0bin_Cyber) 's Twitter Profile Photo

I have just completed the 2nd module of the Google Cybersecurity course.

Course Learnings Summary:

• CISSP's 8 Security Domains
• Explore Sec Frameworks and Controls
• Security Audits
• Basic Security Tools
• Protect Assets and Data

Appreciate everyone’s support

I have just completed the 2nd module of the Google Cybersecurity course. Course Learnings Summary: • CISSP's 8 Security Domains • Explore Sec Frameworks and Controls • Security Audits • Basic Security Tools • Protect Assets and Data Appreciate everyone’s support
account_circle
Zuber(@0bin_Cyber) 's Twitter Profile Photo

I have just completed the first module of the Google Cybersecurity Course, so far I have learned:

• Core Cybersec Concepts
• Skills for Security Analyst
• Eight CISSP Security Domain
• Security Frameworks and Controls.
• Common Tools and Programming Languages.

I have just completed the first module of the Google Cybersecurity Course, so far I have learned: • Core Cybersec Concepts • Skills for Security Analyst • Eight CISSP Security Domain • Security Frameworks and Controls. • Common Tools and Programming Languages.
account_circle
Zuber(@0bin_Cyber) 's Twitter Profile Photo

Day 46 of Networking Basics for Hacker by OccupytheWeb book.

Chapter 14 - SCADA/ICS Networks

* SCADA Manufactures
* SCADA/ISC Communication Protocols
* SCADA Security and Vulnerabilities

Day 46 of Networking Basics for Hacker by @three_cube book. Chapter 14 - SCADA/ICS Networks * SCADA Manufactures * SCADA/ISC Communication Protocols * SCADA Security and Vulnerabilities
account_circle
Zuber(@0bin_Cyber) 's Twitter Profile Photo

Day 45 of Networking Basics for Hackers by OccupytheWeb

Chapter 13 - Automobile Networks

* The CAN Protocols
* CAN-UTILS or SocketCAN
* Setting up a Virtual Can Network
* CAN Simulations
* Reverse Engineer a CAN Packet
* Key Fob Hacking

I got stuck on the most part lol

Day 45 of Networking Basics for Hackers by @three_cube Chapter 13 - Automobile Networks * The CAN Protocols * CAN-UTILS or SocketCAN * Setting up a Virtual Can Network * CAN Simulations * Reverse Engineer a CAN Packet * Key Fob Hacking I got stuck on the most part lol
account_circle
Zuber(@0bin_Cyber) 's Twitter Profile Photo

Day 44 of Networking Basics for Hackers by OccupytheWeb

Chapter 12 - The HTTP Protocol.

* HTTP Protocol
* Status Code
* HTTPS
* Pulling DVWA Image using Docker
* Hacking Web App Authentication with BurpSuite

Day 44 of Networking Basics for Hackers by @three_cube Chapter 12 - The HTTP Protocol. * HTTP Protocol * Status Code * HTTPS * Pulling DVWA Image using Docker * Hacking Web App Authentication with BurpSuite
account_circle