CYBER HUB

1.2K posts

CYBER HUB banner
CYBER HUB

CYBER HUB

@SOCDefender

Cybersecurity Content | SOC | Ethical Hacking | Pentesting + Blue Team๐Ÿ›ก๏ธ

192.168.10.2 Joined Mart 2023
75 Following418 Followers
Pinned Tweet
CYBER HUB
CYBER HUB@SOCDefenderยท
IF YOU SEE IN ALERT, THINK OF MITRE TECHNIQUE
CYBER HUB tweet mediaCYBER HUB tweet mediaCYBER HUB tweet media
English
1
4
17
2.5K
CYBER HUB
CYBER HUB@SOCDefenderยท
LINUX KNOWLEDGE CHECKPOINT Which command is used to display currently logged-in users on a Linux system? A. whoami B. who C. id D. userset
English
0
0
3
56
CYBER HUB
CYBER HUB@SOCDefenderยท
EDR (Endpoint Detection & Response) continuously monitors endpoints, uses AI & behavior analysis to detect threats, investigates root cause, and responds in real timeโ€”isolating devices, stopping attacks, and enabling recovery. Itโ€™s frontline defense against modern cyber threats.
LetsDefend@LetsDefendIO

EDR

English
0
0
1
29
CYBER HUB
CYBER HUB@SOCDefenderยท
โœ… Answer: B) 172.20.15.10 Private IP ranges: 10.0.0.0 โ€“ 10.255.255.255 172.16.0.0 โ€“ 172.31.255.255 192.168.0.0 โ€“ 192.168.255.255 Why others are wrong: A) 8.8.8.8 โ†’ Public (Google DNS) C) 192.0.2.1 โ†’ Reserved (test network) D) 150.10.5.5 โ†’ Public IP
Abdulkadir | Cybersecurity@cyber_razz

NETWORKING KNOWLEDGE CHECKPOINT Which of the following IP addresses is a private IP address? A. 8.8.8.8 B. 172.20.15.10 C. 192.0.2.1 D. 150.10.5.5

English
0
0
0
41
CYBER HUB
CYBER HUB@SOCDefenderยท
Traffic analysis (side-channels). Encryption hides content, not metadata. ISP still sees packet sizes, timing, burst patterns, total bytes 4K streaming has a distinct bitrate + chunk cadence (DASH/HLS) TLS/VPN hides payload, but flow patterns remain visible
Cyber_Racheal@CyberRacheal

Interviewer: When you're using a VPN, your ISP can still see how much data youโ€™re using, but they can't see what youโ€™re doing. However, if you're watching a 4K movie on Netflix over a VPN, a sophisticated ISP can still guess exactly what you're watching just by looking at the "shape" of your traffic. How is that possible if the data is fully encrypted?

English
1
0
2
59
CYBER HUB
CYBER HUB@SOCDefenderยท
Which protocol is used for sending email? A) POP3 B) SMTP C) IMAP D) FTP
English
0
0
1
29
CYBER HUB
CYBER HUB@SOCDefenderยท
โš ๏ธ Donโ€™t type that in your Linux terminal. :(){ :|:& };: is the fork bomb. It creates infinite processes that recursively spawn themselves, quickly consuming CPU and RAM until the system freezes or crashes. A classic Linux prankโ€ฆ and a great reminder: never run unknown command
Abdulkadir | Cybersecurity@cyber_razz

English
0
0
1
46
CYBER HUB
CYBER HUB@SOCDefenderยท
๐Ÿšจ Linux server slow due to high CPU? 1๏ธโƒฃ Check usage: top / htop 2๏ธโƒฃ Find culprit: ps aux --sort=-%cpu 3๏ธโƒฃ Investigate logs: journalctl -xe 4๏ธโƒฃ Restart service or kill process: kill -9 PID 5๏ธโƒฃ Optimize app or limit CPU (nice, cpulimit). Identify โ†’ Fix โ†’ Prevent. #Linux #SysAdmin
Nandkishor@devops_nk

Linux Server is slow due to high CPU utilization. How will you fix it?

English
0
0
2
142
CYBER HUB
CYBER HUB@SOCDefenderยท
๐Ÿ‘‰ ๐—œ๐—ฆ๐—ฆ๐—”๐—ฃ ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐—˜๐˜…๐—ฎ๐—บ ๐Ÿญ: lnkd.in/d5fhGDxu ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐—˜๐˜…๐—ฎ๐—บ ๐Ÿฎ: lnkd.in/dysJm8HD ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐—˜๐˜…๐—ฎ๐—บ ๐Ÿฏ: lnkd.in/dEQtURvp
English
0
0
0
31
CYBER HUB
CYBER HUB@SOCDefenderยท
๐—–๐—œ๐—ฆ๐—ฆ๐—ฃ ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐—˜๐˜…๐—ฎ๐—บ ๐Ÿญ: lnkd.in/dM8AcW-D ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐—˜๐˜…๐—ฎ๐—บ ๐Ÿฎ: lnkd.in/dtybAtuF ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐—˜๐˜…๐—ฎ๐—บ ๐Ÿฏ: lnkd.in/dRixx3Ff
English
1
0
0
65
CYBER HUB
CYBER HUB@SOCDefenderยท
FREE EXAM PRACTICE RESOURCES ๐Ÿ‘‰ ๐—–๐—–๐—ฆ๐—ฃ ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐—˜๐˜…๐—ฎ๐—บ ๐Ÿญ: lnkd.in/dgRQz_DW ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐—˜๐˜…๐—ฎ๐—บ ๐Ÿฎ: lnkd.in/dRWXqwgF ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐—˜๐˜…๐—ฎ๐—บ ๐Ÿฏ: lnkd.in/dGpnFw5n
English
1
0
1
76