Jump to content

mi0

Members
  • Content Count

    30
  • Joined

  • Last visited

Community Reputation

3,030 Excellent

4 Followers

About mi0

  • Rank
    Member
  • Birthday 12/14/1993

Profile Information

  • Gender
    Male

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. PDF Publisher: Wiley; 1 edition (March 20, 2017) [hide][Hidden Content]]
  2. WINDOWS REGISTRY FORENSICS pdf Advanced Digital Forensic Analysis of the Windows Registry [hide][Hidden Content]]
  3. Well Firstly , I admire this bravery you have to give 7 out of 10 to yourself Before I continue , It's compulsory and obligatory to express this proven fact that despite being technical and having a in depth knowledge in many fields such as Networking , Programming , designing , testing , analyzing and further more mathematics , civil engineer , electronic , hardware , nano........., yet it takes significant time from you ,moreover your energy and consequently your life . From many years ago I remember that every one I have seen in field of Penetration testing , He is powerful in 1 field of it , to support this , While you're talking about Networking , I'm not sure you have wide range of experience and also knowledge in every things , every things include Protocol , Infrastructure , functionality , related algorithm to them such as DUAL , and many more topics ,so how you would expect to be successful in pentesting and leveraging into e.g OSPF domain while you're not aware what is LSA , whats is LSDB , what will be happening during redistribution , what is O E1 , how it is worked in MPLS domain , how it send via multiple paths and thousands of contexts there , be expert obviously consume notable time of you , finally those pentesting you had done , from my perspective , are another name rather than any leveraging such as a unauthorized gain access , mostly I called them memorize command and routine task which you could find it not every where but in particular article or books. My suggestion to you is , as you have had a strong background , start with basic concept maybe from udemy (which I have never confirmed it) but could be acceptable for commencing . Second suggestion to you is , learning programming in advance , switch to Golan , C , Assembly , but no machine code By searching you could find as many as training from top notch trainers I am sure they'll give you full and complete sight for correct path . Finally , think differently please , what are the responsibility or accountability of red team as you've mentioned or blue purple green gray yellow any colors name ? are you able to name something further than programing !!!!! can anything be happened without programming !!!!NO Be sure , you can not be successful with other guys tools , try to invent , discover , write by your own , and this goal will not becoming unless you are a expert programmer then finding but , writing exploit , do any thing will be workable . Good luck Hope it is helpful
  4. I can share author's book instead (kernel programming)
  5. Does it new course ? or there is with another different name ? This is a first time I've heard this course from pentester academy
  6. I couldn't open site Does this course has any relation to Mcafee Anti Virus ?
  7. You're welcome , keep continue sharing Thanks
  8. epub version Dark Psychology Secrets: The Essential Guide to Persuasion, Emotional Manipulation, Deception, Mind Control, Human Behavior, NLP and Hypnosis, How To Stop Being Manipulated And Defend Your Mind [hide][Hidden Content]]
  9. Cybersecurity Threats, Malware Trends, and Strategies Mitigate exploits, malware, phishing, and other social engineering attacks Tim Rains 2020 Packt Publishing NO PASSWORD [hide][Hidden Content]]
×
×
  • Create New...