Bhargav Sandilya

1.1K posts

Bhargav Sandilya banner
Bhargav Sandilya

Bhargav Sandilya

@ritzsec

CyberSec enthusiast | Aspiring Network Security Engineer 🕵️‍♂️ | Decrypting networks one packet at a time | Sharing bytes of knowledge, news, memes & musings.

127.0.0.1 Katılım Mayıs 2024
315 Takip Edilen183 Takipçiler
Sabitlenmiş Tweet
Bhargav Sandilya
Bhargav Sandilya@ritzsec·
👋 Hello & Welcome! I'm an aspiring Network Security Engineer documenting my entire journey from beginner to professional. No gatekeeping, just learning in public. My mission is to achieve mastery in network and security fundamentals, integrate automation principles into daily tasks, and contribute to the future of network design in the age of Cloud ☁️ and AI 🤖. On this feed, you can expect: 🔹 Clear explanations of core concepts (OSI, Subnetting, Routing etc...). 🔹 Home Lab builds & configuration troubleshooting. 🔹 Insights into the future of network management and design. 🔹 Honest struggles and lessons learned along the way. If you are a beginner, let's learn together. If you are an expert, your advice is gold. Hit the Follow button 😃 and let me know your favorite networking command below! 👇
English
3
1
25
1.6K
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
I watched a senior dev move his hand from the keyboard to the mouse. He clicked the "Activities" corner, scrolled to the terminal, and typed exit. The entire motion took 2.1 seconds. I tapped on his shoulder. I asked if he was allergic to productivity or just liked the cursor's travel distance. He looked confused and said he was just closing his session. I told him that Ctrl+D takes 0.1 seconds. Over a year, his terminal navigation costs the company a full week of kernel patches. He said it was muscle memory. I told him his muscles were a legacy system. I deleted his xserver-xorg and uninstalled his desktop environment.
English
6
3
33
5.6K
Bhargav Sandilya
Bhargav Sandilya@ritzsec·
🧪 Today’s lab: VLAN segmentation + inter-VLAN routing Set up three departments on the same switch: 🟡 VLAN10 – Engineering 🟢 VLAN20 – HR 🔵 VLAN30 – Sales Each VLAN had its own subnet: • 10.0.0.0/26 • 10.0.0.64/26 • 10.0.0.128/26 Configured: 🔹 Access ports on SW1 for each VLAN 🔹 One router interface per VLAN on R1 🔹 Gateway set to the last usable IP of each subnet Goal: allow communication between VLANs using the router. After configuring everything and verifying the interfaces… All PCs could successfully ping across VLANs. ✅ This lab really showed how VLANs separate networks logically and how routing is required to let them talk. Hands-on labs make networking concepts stick. #Networking #VLAN #PacketTracer #InterVLANRouting #LearningInPublic
Bhargav Sandilya tweet media
English
0
0
2
61
IT Guy
IT Guy@T3chFalcon·
🤣🤣🤣
IT Guy tweet media
QME
5
13
199
4.1K
Bhargav Sandilya
Bhargav Sandilya@ritzsec·
@cyber_rekk Crimping means attaching a connector to the end of a cable using a special tool. For example, putting an RJ45 connector on an Ethernet cable and Splicing means joining two cables together to make one longer cable or repair a cut cable.
English
0
0
0
31
Bhargav Sandilya
Bhargav Sandilya@ritzsec·
@TheCyberPatron_ 192.168.1.1 Reason: The PC is in the 192.168.1.0/24 subnet → default gateway must be in the same subnet (usually .1 or .254 for the router).
English
0
0
0
45
TheCyberPatronNetwork ©
TheCyberPatronNetwork ©@TheCyberPatron_·
Refer to the exhibit. What is a valid address on the PC for the default gateway?  •192.168.255.1 •192.168.2.1 •192.168.1.1 •192.168.0.1
TheCyberPatronNetwork © tweet media
English
15
10
110
7.6K
Bhargav Sandilya
Bhargav Sandilya@ritzsec·
🌐 What is a VLAN (Virtual LAN)? A VLAN lets you divide one physical network into multiple logical networks. Even if all devices are connected to the same switch, VLANs can keep them separated as if they were on different networks. Why do we need VLANs? Without VLANs: • All devices are in the same broadcast domain • More broadcast traffic • Harder to manage and secure networks With VLANs: 🔹 Networks are logically separated 🔹 Broadcast traffic is reduced 🔹 Security improves (devices are isolated) 🔹 Network design becomes more organized Example: A company might use VLANs to separate: • HR department • Finance department • Guest Wi-Fi • IT infrastructure Same switch. Different networks. VLANs make networks more scalable, secure, and easier to manage. Do follow for more such interesting concepts. 😃 #Networking #VLAN #NetworkEngineering #ITBasics #LearningInPublic
English
0
0
1
19
TheCyberChef👨‍🍳| Cybersecurity | Educator🇬🇭🎓
Doesn’t matter if you’re unemployed. You can change your life by getting into cybersecurity. Learn these skills: - Network+ - CCNA - Security+ - Linux - Python - Active Directory - Wazuh - Wireshark - AZ-900 And become in demand. All you need is desire and a good laptop.
English
13
63
435
9.5K
Bhargav Sandilya
Bhargav Sandilya@ritzsec·
💳 What is POS Malware? POS (Point-of-Sale) malware is malicious software designed to steal payment card data directly from retail systems. When you swipe or insert your card at a store, the POS system briefly processes the card details in memory. POS malware secretly scans that memory and extracts information like: • Card numbers • Expiry dates • Cardholder names This stolen data is then sent to attackers, who may sell it or use it for fraud. One of the most famous examples was the Target data breach (2013), where POS malware helped attackers steal data from millions of credit cards. That’s why businesses must protect POS systems with: 🔒 Network segmentation 🔒 System monitoring 🔒 Regular security updates Because sometimes the attack doesn’t target the bank…it targets the cash register. Do follow for more such interesting concepts. 😃 #CyberSecurity #Malware #POSMalware #InfoSec #LearningInPublic
English
0
0
0
33
Bhargav Sandilya
Bhargav Sandilya@ritzsec·
🕵️ Rootkit vs Bootkit - what’s the difference? Both are stealthy types of malware designed to hide deep inside a system, but they operate at different levels. 🔹 Rootkit A rootkit hides inside the operating system after it loads. Its goal is to: • Hide malicious processes • Maintain unauthorized access • Avoid detection by security tools It basically gives attackers root or admin-level control while staying invisible. 🔹 Bootkit A bootkit goes even deeper. Instead of hiding in the OS, it infects the boot process (MBR/UEFI). This means it runs before the operating system even starts. Because of this, it can: • Control the system earlier in the startup process • Survive OS reinstalls in some cases • Be extremely hard to detect 📌 Simple difference Rootkit → hides in the operating system Bootkit → hides in the system’s boot process Both are dangerous because they focus on stealth and persistence, not just damage. Do follow more such interesting concepts. 😃 #CyberSecurity #Malware #Rootkit #Bootkit #LearningInPublic
English
0
0
1
57
Ehis
Ehis@EhistheGreat·
@ritzsec Brace yourself you gonna need all the resources you can get
English
1
0
2
563
Ehis
Ehis@EhistheGreat·
Do people with CCNP really have all this knowledge stored in there head , cause it seem my storage is getting full 🥲Multicast and Bgp alone should be a course
English
10
5
110
6.9K
Security Trybe
Security Trybe@SecurityTrybe·
World's Top 25 Most Common Passwords 1. 123456 2. 123456789 3. 12345678 4. password 5. qwerty123 6. qwerty1 7. 111111 8. 12345 9. secret 10. 123123 11. 1234567890 12. 1234567 13. 000000 14. qwerty 15. abc123 16. password1 17. iloveyou 18. 11111111 19. dragon 20. monkey 21. 123123123 22. 123321 23. qwertyuiop 24. 00000000 25. Password Source: NordPass (2024)
English
1.3K
1.7K
16.6K
3.8M
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________ a) DNS lookup b) DNS hijacking c) DNS spoofing d) DNS authorizing
English
31
11
133
11.9K
Bhargav Sandilya
Bhargav Sandilya@ritzsec·
🔐 Daily Cyber & Tech Update: ⚖️ DOJ seizes $61 million in Tether-linked cryptocurrency funds👇 The U.S. Department of Justice has seized $61 million in Tether (USDT) tied to cybercrime operations, marking another major enforcement action targeting illicit crypto-linked activities. 🔗 thehackernews.com/2026/02/doj-se…
English
0
0
1
87
Bhargav Sandilya
Bhargav Sandilya@ritzsec·
🔐 Daily Cyber & Tech Update:- 🚨 “ClawJacked” flaw lets malicious sites hijack browser sessions👇 Researchers disclosed the ClawJacked vulnerability, which allows malicious websites to hijack active browser sessions and potentially gain unauthorized access to user accounts. 🔗 thehackernews.com/2026/02/clawja…
English
0
0
0
19
Bhargav Sandilya
Bhargav Sandilya@ritzsec·
💾 Why are data validation and data at rest protection so important? Because not all threats come from outside. 🔹 Data Validation This makes sure the data entering your system is correct, safe, and expected. Without validation: • Malicious input can break applications • SQL injection becomes possible • Systems process harmful data It’s basically your first security filter. 🔹 Data at Rest This is data stored in databases, servers, laptops, backups. If it’s not encrypted: Anyone who gains access can read everything instantly. Encryption at rest ensures that even if data is stolen , it’s still unreadable. In simple terms: Validation protects what comes in. Encryption protects what stays stored. Both are essential. 🔐 Do follow for more such interesting concepts. 😃 #CyberSecurity #DataSecurity #InfoSec #LearningInPublic #SecurityBasics
English
0
0
0
36
Ray’Clef
Ray’Clef@rayclefxxr·
Just finished my introduction to cybersecurity with CISCO NETWORKING Excited to keep building my skill @CiscoNetAcad
Ray’Clef tweet media
English
6
1
18
399