OccupytheWeb
@three_cube
Pentester, Forensic investigator, and former college professor. Trained hackers at every branch of US military and intelligence.
Visit me at https://t.co/G478wufszw
ID:443369826
22-12-2011 03:33:54
79,8K Tweets
206,7K Followers
4,9K Following
Follow People
Networking Basics for Hackers, Part 2 TCP/IP #networkbasics #tcp #networkbasics 4hackers #cyberwarrior #cybersecurity #infosec
hackers-arise.com/post/networkin…
Network Forensics, Part 1: Wireshark Basics #wireshark #networkforensics #cybersecurity #cyberwarrior
hackers-arise.com/post/2018/09/2…
Finished OTW Become a Master Hacker book, it was a great read and learning journey. After that I went through LBFH videos, network basics videos, currently on python. And I just wanna share some love to master OccupytheWeb cause he's a great teacher and all is content is priceless
TCP- 22 sec
UDP-391 sec
When scanning for UDP ports with tools such as nmap, it can take a bit longer as UDP does not have a response for lost packets or closed ports. Nmap simply waits a specified time, and if no response is returned, it assumes the port is closed.OccupytheWeb
1. Linux Basic For Hackers from OccupytheWeb
I mentioned this in a previous Twitter thread but this book is an essential read for new hackers because of the simple ways in which Occupy The Web breaks down the subjects contained in the book.
OccupytheWeb Hey!
This is fun and you learn a lot about
Wireless communications. <~~~~ essential
OccupytheWeb is masterful at the art of teaching. Check out his interviews with David Bombal.
youtu.be/3yiT_WMlosg
OccupytheWeb Yes sir! you need to think like an attacker and defender when doing cyber attacks or protecting from cyber attacks. This is why network and digital forensics is an essential key
Hack to Spy: Building a Raspberry Spy Pi #hack2spy #rpi #spypi #cybersecurity #cyberwarrior
hackers-arise.com/post/2016/09/1…
Back again with another chapter.
Day 43 of Networking Basics for Hackers by OccupytheWeb
Chapter 11: Simple Network Management Protocol
* Background on SNMP
* SNMP Versions
* Wireshark Analysis of SNMP
* Abusing SNMP
* Cracking SNMP Strings
* NSA Exploits Against SNMP
Introduction to IoT/Embedded Linux, Part 1: The OpenWRT Project #iot #openwrt #scada #cybersecurity #embeddedlinux
hackers-arise.com/post/introduct…
⚠️You won't find another class like this anywhere!!!
Master OTW OccupytheWeb walks you through the techniques he and his team used to hack cameras in Ukraine and Russia at the request of the Ukraine Army.
hackers-arise.com/online-store/I…
Hey guys ....
I really like this people combo 🤍🫂David Bombal and OccupytheWeb
Best it and cyber security channel
youtu.be/R1amgARgFDs
Mohammad Zeitoun OccupytheWeb Get the sec+ test done; then I’m hacking the world got a bit.🙂