Antlok

3.5K posts

Antlok banner
Antlok

Antlok

@amintemi69

WhiteHat | ISC² Certified in Cybersecurity (CC) | Offensive Security Specialist

Afrika Katılım Temmuz 2024
708 Takip Edilen865 Takipçiler
Antlok
Antlok@amintemi69·
Shell types explained: Reverse shell → target connects to attacker Bind shell → attacker connects to target Web shell → persistent code on web server Each has detection profiles. Know when to use each. #Shells #Pentesting
English
0
0
0
5
Antlok
Antlok@amintemi69·
A reverse shell is the moment a pentest becomes real. The machine calls back to you. That connection represents full code execution on a remote system. #ReverseShell #EthicalHacking
Antlok tweet media
English
0
0
0
7
Antlok
Antlok@amintemi69·
Metasploit is one of the most powerful frameworks in ethical hacking. But use it as a learning tool first, not a shortcut. Understand what each module does under the hood. #Metasploit #EthicalHacking
Antlok tweet media
English
0
0
3
18
Antlok
Antlok@amintemi69·
Getting a low-privilege shell is just the start. Privilege escalation is where the real skill shows. Root access changes everything. #PrivEsc #Pentesting
Antlok tweet media
English
0
1
4
22
Antlok
Antlok@amintemi69·
Linux commands every pentester must know: find / -perm -4000 → SUID files ls -la → hidden files ps aux → running processes netstat -tulnp → open ports cron -l → scheduled jobs uname -a → kernel version Save this. #LinuxPrivEsc
Antlok tweet media
English
0
1
5
26
Antlok retweetledi
Winston Ighodaro
Winston Ighodaro@Officialwhyte22·
Checking Who You Are and What You Can Access A lot of Linux confusion starts when people forget that the system treats users differently. Two people can run the same command and get completely different results simply because of ownership, groups, or permissions. Before assuming something is broken, the smart thing is to confirm who you are on the system and what level of access you actually have. In the terminal below, I am checking my current user, the groups attached to that user, and then testing access to a protected file. I first confirm my identity, then verify whether I belong to any privileged group, and after that I try reading a file that regular users normally cannot open. This is the normal way to understand whether a problem is really a system issue or just an access issue. This is one of those small Linux habits that saves time immediately. Instead of guessing why a command failed, you verify your user context first. Once that becomes normal to you, permissions start making much more sense and troubleshooting becomes cleaner.
Winston Ighodaro tweet media
English
2
12
52
1.6K
Antlok retweetledi
Hackademy
Hackademy@hack_ademy·
A lot of Linux confidence comes from being able to create small files, inspect them, and confirm their contents without leaving the terminal. This sounds basic, but it is one of the habits that makes everyday work smoother because notes, configs, quick outputs, and test files all start the same way. If you can create and verify files cleanly, you already move better than someone who depends on clicking around for everything. In the terminal below, I am creating a simple text file, checking that it exists, and reading it back from the shell. Nothing here is flashy, but it is the exact kind of normal Linux usage that keeps showing up in real work. Small actions like this are what make the terminal feel useful instead of intimidating. This is how Linux starts becoming practical. You are not trying to impress the system, you are just working with it in a direct way. Once this feels normal, a lot of other things like logs, scripts, outputs, and configs start making much more sense because they all build on the same habit of creating, checking, and reading files properly.
Hackademy tweet media
English
0
6
39
1.4K
Antlok
Antlok@amintemi69·
Linux is not optional in ethical hacking. It is the environment. The terminal is your most powerful weapon. Get comfortable or get left behind. #Linux #KaliLinux
Antlok tweet media
English
0
0
1
8
Antlok retweetledi
Hackademy
Hackademy@hack_ademy·
Thank you guys. We launched in February and 3000 people loved our work and decided to follow us. We love you!
Hackademy tweet media
English
0
5
34
708
Antlok
Antlok@amintemi69·
💻 5+ Hours of Pure Chaos & Code. 🛡️ What went down: The "Pillars" of Life: @Officialwhyte22 out here schooling us on OOP and the fundamental structures of the craft. The Hacker Dilemma: We even got into the real-world stuff like the age-old debate of why hackers shouldn't marry. (Between the late-night exploits and the 2:00 AM bug hunts, who has time for a social life, right? 😂) @hack_ademy, thanks for the vibes and the knowledge. This isn't just a group; it’s a movement. If you’re on the outside looking in, you’re losing out on the real juice.
Antlok tweet media
English
0
0
0
65
Antlok
Antlok@amintemi69·
🚀 Pentesting warriors, RT & bookmark this Nmap flag cheat sheet; your scans just got lethal! 💥Essential flags every hacker needs locked & loaded: • -sV → Service version detection (ID those apps!) • -O → OS fingerprinting (Know thy enemy OS) • -A → Aggressive scan (version + OS + scripts + traceroute!) • -sC → Default NSE scripts (quick wins) • --script vuln → Vulnerability hunting mode • -p- → Scan ALL 65535 ports (no stone unturned)Pro tip: Chain 'em like -A -sC --script vuln -p- for max chaos. What's your go-to Nmap combo? Drop it below! 👇#Nmap #PentestTools #CyberSec #Hacking
English
0
0
1
58
Antlok
Antlok@amintemi69·
Hackdemy Command Reference Tool: Your Terminal Mastery Sidekick! 🚀 This video shows what you're missing out on: 332 Linux & 209 windows commands with search, stats, favorites, & OS switching. Level up your CLI skills for pentesting & beyond; no more fumbling in the terminal! 💻🔒 Big shoutout to @Officialwhyte22 & @hack_ademy for this essential tool! To find out more about hackademy check out our website: hacka-demy.thinkific.com #Hackademy #EthicalHacking #Cybersecurity
English
2
1
14
1.9K
Antlok
Antlok@amintemi69·
🚀 Nmap: Way More Than a Port Scanner! It's a fingerprinting engine that IDs services like a pro, a script runner for custom NSE magic, and a service enumerator uncovering hidden gems. Yet most of us stick to the basics using just 5% of its power. 😤 Level up your scans! What's your go-to Nmap hack? Drop it below 👇 #Nmap #EthicalHacking #CyberSecurity
Antlok tweet media
English
0
0
1
43
Antlok
Antlok@amintemi69·
Tonight's lab: building a recon methodology checklist from scratch. If your process isn't documented, it isn't repeatable. #OffensiveSecurity #HackerMindset
Antlok tweet media
English
0
0
0
29
Antlok
Antlok@amintemi69·
🔎 Google Dorks: Indexed Secrets Exposed `site:target.com filetype:sql` → Dump files galore. `inurl:admin filetype:php` → Login panels. `intitle:"index of" password` → Open directories. Craft dorks like: `site:*.target.com -www intext:api_key`. Goldmine! 💎 Wrap: Passive recon = foundation of any op. Stack 'em! #GoogleDorks #OSINT RT if useful! 🔥
English
0
0
0
14
Antlok
Antlok@amintemi69·
🏢 WHOIS: Ownership Deep Dive `whois target.com` → Registrar, owner name/email, creation date. Use whois.domaintools.com for history & privacy bypass views. Chain with historical WHOIS for domain flips & squatters. Timeless recon! 📋 #WHOIS #DomainRecon
English
1
0
0
19
Antlok
Antlok@amintemi69·
🚨 Passive Recon Arsenal: Gather Intel Without Touching the Target! 🚨 Thread: No packets sent. Pure OSINT gold. 👇 1️⃣ Shodan — Exposed services & IoT everywhere 2️⃣ theHarvester — Emails, subdomains on lock 3️⃣ Maltego — Map relationships like a boss 4️⃣ WHOIS — Unmask ownership 5️⃣ Google Dorks — Secrets in plain sight Stay stealthy! 🕵️‍♂️ #CyberSec #OSINT #Hacking #InfoSec
Antlok tweet media
English
1
0
0
33