Faustina Obidire | Cybersecurity

60 posts

Faustina Obidire | Cybersecurity

Faustina Obidire | Cybersecurity

@FObidireSec

Purple Team Trainee: SOC/VAPT | OT/ICS Security & Energy Efficiency Assurance | Learning Post-Quantum Cryptography. @FObidireSec

Nigeria Katılım Ağustos 2024
81 Takip Edilen28 Takipçiler
Sabitlenmiş Tweet
Faustina Obidire | Cybersecurity
Sharing what I’ve learnt on the Malware Analysis PART ONE! INTRODUCTION TO MALWARE ANALYSIS. Definition of Malware? as an executable/binary that is malicious in nature. The ways by which attackers use malware for: • Spying on the target through spyware, keyloggers @Techboy150
English
4
2
16
982
Humble
Humble@Officialhumbl1·
HOW TO CREATE AN ACCOUNT ON OUTLIER One thing is to create an account, another thing is to pass the onboarding quest Here's a proven step-by-step method to open an account, success rate is high when done carefully. I started OutlierAi early February and have made over $5K+
Humble tweet mediaHumble tweet mediaHumble tweet media
English
622
807
5.5K
1.6M
Omoalhaja
Omoalhaja@omoalhajaabiola·
If fiverr isn’t working, use upwork If result isn’t coming from upwork, use peopleperhour If the three fail, Pivot to LinkedIn And cold emailing. Or Craiglist Smart freelancers combine all for consistent and diverse client base and earnings Move, you aren’t a tree
English
45
205
1.2K
31.6K
Damostar | CRM & Automation
Damostar | CRM & Automation@Adeleke82750993·
@Cece_UIUX @omoalhajaabiola Many people are on Upwork and they're not making a dime, simply because they said "Connect" anyways I don't know if you have Idea about what I'm talking about, But I can assist you though. Let's connect
English
1
0
2
91
Faustina Obidire | Cybersecurity retweetledi
DramaAlert
DramaAlert@DramaAlert·
Cat fishing AI technology has been released... its so over.
English
1.2K
1.9K
19.7K
15.3M
Ry
Ry@Ryanmariebach78·
I'm trying to help my son decide on a career path that won't get taken over by Ai. Any suggestions?
English
10.4K
315
6.2K
2.5M
Sarcastic Geek
Sarcastic Geek@gozkybrain4u·
“Can you differentiate between Authentication and Authorization in simple terms like I am new to all these?” - @Morh_gan12
Sarcastic Geek tweet media
English
53
4
160
18K
Elorm Daniel
Elorm Daniel@elormkdaniel·
Imagine receiving a normal WhatsApp message from someone… and later discovering that the message secretly contained their exact location, even though they never shared it. That’s exactly what happened during a recent forensic extraction I performed on my iPhone 12 Pro Max. During the analysis, I found a I decided to pick a message I received from @RedHatPentester, on 3rd September 2025 at 7:11 AM. Nothing unusual at first glance just a regular text. But deep inside the message metadata, the phone had silently logged: @RedHatPentester exact location at the moment he sent that message. He didn’t share it intentionally. I didn’t request it. Yet the device recorded it automatically. This was extracted directly from my own phone, meaning: If your location is turned ON while chatting on WhatsApp, your exact location can be extracted from someone else’s device if theirs undergoes forensic imaging. Most people have absolutely no idea this happens. But this was only the beginning. Also, every single file created on the device, ie: photos, videos, screenshots, recordings had the exact location of where I was when that file was created. The phone automatically logged precise GPS coordinates for each media file. This means investigators can determine where you were at the exact moment you took a picture, recorded a video, captured a screenshot, or created any media on the device. This level of metadata helps reconstruct movements, timelines, and behaviors with incredible accuracy. The extraction revealed far more than hidden location data and remember, this phone was NOT jailbroken. Here’s what else was recovered: 1. Full Synchronized Accounts & Passwords The extraction pulled: •URLs •Usernames •Passwords •Stored login metadata Basically, every synchronized password ever used on the device all recovered without jailbreak. 2. Complete Application Logs & Histories Every installed application had: ✔ Detailed logs ✔ Usage history ✔ Internal data ✔ Metadata Even apps considered “secure” or “encrypted” still left behind recoverable traces. 3. Full WhatsApp Data, Including Group Histories WhatsApp revealed more than most users realize: •Full history of every group ever joined •Date each group was created •Who created it •Date I was added •Group metadata even after you exit the group This is critical in investigations because a suspect cannot deny belonging to a group when the device itself retains: 📌 Creation date 📌 Creator identity 📌 Join date 📌 Participation timeline Even if they left the group years ago. 4. Message-Level Location Metadata The iPhone logged exact sender locations at the moment messages were typed and sent just like what happened with @RedHatPentester message. Most people never see this. Investigators do. Why This Matters Every phone tells a story. Every app keeps footprints. Every message carries more than text. This extraction proves that even without a jailbreak, investigators can discover: ✔ Locations ✔ Passwords ✔ Group associations ✔ Message histories ✔ Detailed app activity ✔ Metadata most users never realize exists Digital devices rarely forget even when the user does.
Elorm Daniel tweet mediaElorm Daniel tweet mediaElorm Daniel tweet mediaElorm Daniel tweet media
English
212
2.4K
10.3K
4.4M
Faustina Obidire | Cybersecurity
@buildwithdudu In any Tech field you find yourself, money shouldn’t be a determining factor for your choice. Just pursue being excellent at what you do, cos that money will definitely chase after you!
English
0
0
4
347
Buildwithdudu
Buildwithdudu@buildwithdudu·
Tech schools abeg make una pity us nauuuu 🫠🫠😂😂😂
English
119
281
2.2K
87.1K
Cadently
Cadently@cadently_·
@jbmillenial @buildwithdudu But why you go learn cyber security to work with Nigerian fintech? Omo the first thing to know when learning cybersecurity na say you no won work with Nigerians.
English
2
0
1
399
𝕯✨
𝕯✨@Darasiimi1·
@FObidireSec Oh hi, I’m sorry I don’t. Have you tried LinkedIn?
English
1
0
0
20
Faustina Obidire | Cybersecurity
@SecurityTrybe It is User Education because MFA, Strong passwords, and continuous monitoring are embedded in user education. Therefore, constant security awareness training should be provided for users of the digital space.
English
0
0
3
325
Security Trybe
Security Trybe@SecurityTrybe·
What is most important when securing devices and infrastructures? 1) Multi-factor Authentication (MFA) 2) User Education 3) Strong Passwords 4) Continuous Monitoring
English
59
12
118
23.3K
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
What does a well-designed security policy aim to achieve? A. Reduce the complexity of the system B. Reduce the cost of system operations C. Increase the potential of security breaches D. Reduce the potential of security breaches to an acceptable level
English
23
6
49
5.5K
Faustina Obidire | Cybersecurity
@jaachyke @Jerale9 @miss_morkor You need to apply logic when replying my comment. Cos you need to give your points on why that is nonsense instead of acting like an emotional crybaby. If men could put to birth, and roles were reversed, would the man let his kids take the wife’s surname??
English
1
0
0
48
Faustina Obidire | Cybersecurity
@Jerale9 @miss_morkor Why is the thought of your kids bearing your wife’s name & not yours making you frustrated??? From your response, all I can say is Congratulations to you and your wife!👏 You guys deserve each other.
English
1
0
0
45
jerale🏰
jerale🏰@Jerale9·
@FObidireSec @miss_morkor To show u how useless and dumb u are. I had to show diz tweet to my wife. And she went laughing. Do u think everybody on diz app is miserable or sad in their marriage life🤷🤦🤦
English
1
0
1
57
Faustina Obidire | Cybersecurity
@enturypresident @miss_morkor I want our kids to take my surname because my enemy could have died in that labor room. Is that too much to ask? You have to pick a side, 2m + 1.5m=3.5 m household income with our kids bearing my Surname OR 2m household income with our kids bearing yours!
English
1
0
0
13
Angry Nigerian🗿
Angry Nigerian🗿@enturypresident·
@FObidireSec @miss_morkor Faustina....why do you want our kids taken ur surname instead of mine?, I need to know where this thought process is coming from... I earn 2m, you earn 1.5m or vice versa, and married , yet you want our kids to taken your own surname?...indulge me please 😂
English
1
0
0
21
Faustina Obidire | Cybersecurity
@enturypresident @miss_morkor … You only defined what cheating is but didn’t say if you would partake in it or not! Just like you were proud to say you love doing house chores, you should also say “you will cheat on your wife” that shouldn’t be difficult.
English
2
0
0
18
Faustina Obidire | Cybersecurity
@enturypresident @miss_morkor If this is how you think, then you are a selfish person. Since you are driven by curiosity, is it not logical that you discuss the possibility of having another wife and if she doesn’t want that, you move on with someone that does to prevent breach of trust?? You only defined…
English
1
0
0
10