M_Kunjo

558 posts

M_Kunjo

M_Kunjo

@Modukunjo

IT Support Specialist In Healthcare || Aspiring Network Security Engineer & Pentester || Cybersecurity Enthusiast || Learn. Break. Fix. Repeat ||

Abuja, Nigeria Katılım Mart 2014
625 Takip Edilen392 Takipçiler
Sabitlenmiş Tweet
M_Kunjo
M_Kunjo@Modukunjo·
How I set up Active Directory using Server Core (No GUI) 1. Installed Windows Server Core on a VM (no GUI, only command line) 2. Used sconfig to configure: -Server name -Network settings -Remote access 3. Assigned a static IP (192.168.1.1) 4. configured DNS which is very important for Domain controller 5. Installed Active Directory using PowerShell: Command: Install-WindowsFeature AD-Domain-Services 6. Promoted server to Domain Controller: ICommand: nstall-ADDSForest 7. Created structure: -OUs (HR, IT, Admin) - Users & Groups lesson: 👉 DNS is EVERYTHING in Active Directory If DNS fails, the domain becomes unreachable This setup reflects real enterprise environments where GUI is minimal and control is done via CLI Next: Joining client machines + applying GPOs #100DaysOfCode #CyberSecurity #WindowsServer #ActiveDirectory
M_Kunjo tweet mediaM_Kunjo tweet mediaM_Kunjo tweet mediaM_Kunjo tweet media
English
4
9
129
6.1K
M_Kunjo retweetledi
MrKay
MrKay@mr_kay7·
Module 3 @CiscoNetAcad Done☑️ Just wrapped up Wireless Networks and Mobile Connectivity. It's fascinating to see how the settings we use every day on our phones actually bridge into the wider network infrastructure #CyberSecurity #Cisco #LearningInPublic #Networking
MrKay tweet mediaMrKay tweet mediaMrKay tweet media
MrKay@mr_kay7

Module 2 @CiscoNetAcad Networking Basics: Completed! ✅ Rounded up ISP connectivity. It’s good seeing the sheer variety of ways we stay connected from DSL and Cable to Satellite and Cellular. #CyberSecurity #LearningInPublic #SOCPath #Networking

English
4
1
38
518
M_Kunjo retweetledi
Abdulkadir | Cybersec
Abdulkadir | Cybersec@cyber__razz·
Got suspended for no freaking reason at 43.5k followers I’ll be here till I get the account back or whatever If you love my content… please do well to shoot me a follow again ❤️
Abdulkadir | Cybersec tweet media
English
51
33
167
15.7K
M_Kunjo
M_Kunjo@Modukunjo·
Digital Forensics Case Study: Hidden Data Inside an Image As part of my cybersecurity learning journey, I conducted a hands-on digital forensics investigation on a suspicious image file. What I did: - Verified file type using Linux CLI tools - Analyzed metadata with ExifTool - Inspected image structure using ImageMagick - Detected hidden content using Binwalk - Extracted embedded files and analyzed their contents Key Findings: - The image appeared normal but contained an embedded ZIP archive - The file had no meaningful metadata, indicating possible tampering - Image analysis showed zero entropy (completely white), suggesting it was artificially created - Hidden data was successfully extracted from within the file Conclusion: This case demonstrated how attackers can hide data inside seemingly harmless files to bypass detection systems. Lesson Learned: Never trust file extensions. Always verify, analyze, and investigate deeply. Tools Used: Linux CLI, ExifTool, Binwalk, Strings, ImageMagick This is part of my journey toward becoming a cybersecurity professional. @_DeejustDee @ireteeh @segoslavia @cyberjeremiah @jay_hunts #Cybersecurity #DigitalForensics #Linux #EthicalHacking #BlueTeam #LearningInPublic
M_Kunjo tweet mediaM_Kunjo tweet mediaM_Kunjo tweet mediaM_Kunjo tweet media
English
1
3
16
549
M_Kunjo retweetledi
TryHackMe
TryHackMe@tryhackme·
Want to learn pentesting but don't know where to start? 🔐 There's a clear path. And we've mapped the whole thing out. 🔗 tryhackme.com/path/outline/j…
TryHackMe tweet media
English
2
34
258
9K
M_Kunjo retweetledi
MrKay
MrKay@mr_kay7·
Catching up on the @TechSphereAcad class I missed. Diving into Threat Intelligence. It’s one thing to see an alert, but using the Diamond Model to understand the 'Who, How, and Why' behind an attack is a game changer #CyberSecurity #ThreatIntel #SOC
MrKay tweet mediaMrKay tweet mediaMrKay tweet mediaMrKay tweet media
English
3
3
20
1K
M_Kunjo
M_Kunjo@Modukunjo·
@ireteeh Hello Dr here I am. I will really be honored to be followed by you my future Mentor God willing
English
0
0
1
67
Dr Iretioluwa Akerele
Dr Iretioluwa Akerele@ireteeh·
I want to follow more Cybersecurity beginners and support them by reposting their content. If you’re learning Cybersecurity and I have not followed you yet, please let me know 💙
English
361
67
756
28.6K
Katy 
Katy @Maroup_·
Drop your email I’ll sent you the soft copy. RT for others🙏🏼
Katy  tweet media
English
1.8K
1.1K
5.6K
148.1K
M_Kunjo retweetledi
M_Kunjo
M_Kunjo@Modukunjo·
As a Cybersecurity Beginner Anything you are doing without labs or practicals is just like reading an article except otherwise if you are into cybersecurity awareness
English
5
6
78
1.8K
M_Kunjo
M_Kunjo@Modukunjo·
Most people believe they are aware… Until the moment they are tested. A well-crafted message. A familiar name. A sense of urgency. And suddenly, logic steps aside. Human vulnerability is not about lack of intelligence. it’s about timing, emotion, and context. The question is not: “Do you know about attacks?” The real question is: “Will you recognize one when it matters?”
English
0
0
0
7
M_Kunjo
M_Kunjo@Modukunjo·
The most dangerous part of an attack doesn’t happen on a computer. It happens in the mind. Before a password is stolen, trust is established. Before a system is accessed, doubt is removed. Before a breach is detected, a decision is made. Attackers don’t start with code. They start with you.
English
0
0
0
8
Jimoh Zainab
Jimoh Zainab@zyainy·
Let’s do 99 names of Allah Ar-Rahman Add yours
English
457
156
1.5K
36.1K
M_Kunjo
M_Kunjo@Modukunjo·
Beginner mistake: Learning hacking before learning SECURITY. If you don’t understand: • CIA Triad • Risk management • Access control You’re building skills on sand.
English
0
0
1
13