ROHAN

632 posts

ROHAN banner
ROHAN

ROHAN

@takkerohan97

Product Security Engineer | Security Architecture & Threat Modeling I post Cybersecurity + Tech + AI insights

India Katılım Temmuz 2015
632 Takip Edilen187 Takipçiler
Sabitlenmiş Tweet
ROHAN
ROHAN@takkerohan97·
If you’re interested in things like, - security architecture - threat modeling - attack paths - trust boundaries - auth design - real-world security reviews you’ll probably enjoy the kind of stuff I post here 👀
English
1
0
4
105
yellow theCreator
yellow theCreator@perkmaybe·
You can gain 500 followers per day. If you want to gain followers, drop "Hi" and connect with everyone who likes it. I’ll do shoutouts for my active followers.
English
1.1K
162
621
16.5K
ROHAN
ROHAN@takkerohan97·
“Temporary” firewall rules, bypasses, and admin access somehow survive every cleanup cycle. Meanwhile actual features get deprecated in 3 months. 😂 Who else has seen “temporary” access become permanent?
GIF
English
0
0
0
7
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Drop your handles in your in Cybersecurity. Engage with other cyber fellows.
English
35
6
36
1.4K
yellow theCreator
yellow theCreator@perkmaybe·
Another day to grow your X account, who is active to gain?
English
1.1K
172
654
16.1K
Jesse--The Data Guy
Jesse--The Data Guy@Mbadiwejesse·
I’m a senior data analyst. If you’re learning: • Statistics • SQL • Excel • Power BI •Python • Data Modeling • Data Visualization • AI for data analysis and looking to break into data analytics. This account shares practical insights on Statistics, SQL, Excel, Python, Power BI, Data Modeling, and Data Visualization, Ai for data analysis - helping you skip the headaches and fast-track your career.
English
12
14
206
9.6K
ROHAN
ROHAN@takkerohan97·
Just discovered a tool called linutil to simplify linux tasks 🔥 It helps you set up applications and optimize your system for specific use cases github.com/ChrisTitusTech…
English
0
0
2
27
XXIII
XXIII@Maskoff023·
Cybersecurity isn’t one job, it’s a whole battlefield with different roles SOC Analyst → watches attacks in real time Pentester → breaks systems to find weak points Incident Responder → stops active breaches Threat Intel → studies hackers & predicts attacks Cloud Security → protects AWS/Azure systems GRC Analyst → handles policies & compliance Malware Analyst → reverse-engineers viruses Same goal. Different missions. Most beginners think cybersecurity = hacking… but real cyber work is layered, structured, and specialized. Choose the lane that matches your mindset, not just the hype. #Cybersecurity #Infosec #SOC #EthicalHacking
English
1
6
34
566
ROHAN
ROHAN@takkerohan97·
@Maskoff023 correct ,its less about “learning hacking” and more about finding the role that fits your mindset
English
0
0
1
32
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
Which type of cybersecurity attack is this? 💀😏
Vivek | Cybersecurity tweet media
English
1
0
1
161
ROHAN
ROHAN@takkerohan97·
@Itsfoss du -sh * | sort -hr | head shows the biggest space hogs instantly instead of blindly deleting files
English
2
0
4
311
It's FOSS
It's FOSS@Itsfoss·
Share your favorite command line trick or tool to free up disk space on Linux 👇
English
36
5
44
7.3K
ROHAN
ROHAN@takkerohan97·
Good threat modeling is not a PowerPoint exercise. It should directly influence: - architecture decisions - CI/CD controls - logging & monitoring - access control - secure defaults
English
0
0
0
17
ROHAN
ROHAN@takkerohan97·
The real risks usually aren’t advanced APTs. They’re basic things like: - exposed internal APIs - excessive IAM permissions - no network segmentation - public S3 buckets - weak secrets management - skipped security reviews before release Fast scaling + weak security foundations = predictable incidents.
English
1
0
0
18
ROHAN
ROHAN@takkerohan97·
Most threat modeling in Indian startups fails before it even starts. Not because engineers lack skill. Because threat modeling is often treated as: - a compliance activity - a one-time workshop - a document to satisfy enterprise customers Security becomes theory while production keeps changing. #threatmodelling
English
1
0
1
20
ROHAN retweetledi
Web Security Academy
Web Security Academy@WebSecAcademy·
Too many beginners are making this mistake! Using AI for hacking is powerful, but it is 100x more powerful when wielded by someone who knows how to hack. Learn the basics, and then use AI to augment yourself.
Web Security Academy tweet media
English
2
5
46
1.8K
ROHAN
ROHAN@takkerohan97·
Unpopular truth for cybersecurity beginners: Stop chasing certs, CTFs, and “learn everything” roadmaps. Most of you are collecting badges while real skills pass you by. The ones actually getting hired and respected went narrow & deep, broke their own labs, and learned to read malicious code like a book. Certifications are expensive theater. Depth beats breadth. #cybersecurity #infosec
English
0
0
0
22
ROHAN
ROHAN@takkerohan97·
Foundational
Vivek | Cybersecurity@VivekIntel

𝗟𝗶𝗻𝘂𝘅 𝗖𝗼𝗺𝗺𝗮𝗻𝗱𝘀 𝗘𝘃𝗲𝗿𝘆 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗟𝗲𝗮𝗿𝗻𝗲𝗿 𝗦𝗵𝗼𝘂𝗹𝗱 𝗞𝗻𝗼𝘄 🐧💻 ━━━━━━━━━━━━━━━━━━ 1️⃣ Getting Started With The Terminal • pwd → show current directory • whoami → show logged-in user • clear → clear terminal screen • exit → close terminal session ━━━━━━━━━━━━━━━━━━ 2️⃣ Navigating The File System • ls → list files & directories • ls -l → detailed file list • ls -a → show hidden files • cd folder → change directory • cd .. → move one directory back • cd ~ → go to home directory • tree → visualize directory structure ━━━━━━━━━━━━━━━━━━ 3️⃣ Working With Files & Directories • touch file.txt → create empty file • mkdir folder → create directory • cp source dest → copy file • cp -r dir1 dir2 → copy directory recursively • mv old new → move or rename file • rm file.txt → delete file • rm -r folder → delete directory recursively • rmdir folder → remove empty directory ━━━━━━━━━━━━━━━━━━ 4️⃣ Viewing & Editing Files • cat file.txt → display file contents • less file.txt → read large files • head file.txt → first 10 lines • tail file.txt → last 10 lines • nano file.txt → beginner-friendly editor • vim file.txt → advanced editor ━━━━━━━━━━━━━━━━━━ 5️⃣ Searching & Finding Files • find /path -name file → search file by name • grep "text" file.txt → search text inside file • grep -r "text" /path → recursive search • locate filename → quickly find files ━━━━━━━━━━━━━━━━━━ 6️⃣ Installing & Managing Software (Debian / Ubuntu Based) • sudo apt update → refresh packages • sudo apt upgrade → upgrade installed packages • sudo apt install package → install software • sudo apt remove package → remove software • dpkg -i package.deb → install .deb package ━━━━━━━━━━━━━━━━━━ 7️⃣ System Information & Monitoring • uname -a → kernel & system info • top → real-time process monitoring • htop → interactive process viewer • df -h → disk usage • du -sh folder → folder size • free -h → memory usage • uptime → system uptime • hostname → system name • lscpu / lsblk / lsusb / lspci → hardware info ━━━━━━━━━━━━━━━━━━ 8️⃣ Users & Permissions Management • adduser username → create user • passwd username → change password • chmod 755 file → modify permissions • chown user:group file → change ownership • id → user UID & groups • who / w → logged-in users ━━━━━━━━━━━━━━━━━━ 9️⃣ Networking Commands • ip a / ifconfig → network interfaces • ping hostname → test connectivity • curl website[.]com → retrieve web data • wget url → download files • netstat -tuln → open ports • ss -tulwn → socket statistics ━━━━━━━━━━━━━━━━━━ 🔟 File Compression & Archiving • tar -cvf archive.tar folder/ → create tar archive • tar -xvf archive.tar → extract tar archive • gzip file → compress file • gunzip file.gz → decompress gzip file • zip -r archive[.]zip folder/ → create zip archive • unzip archive[.]zip → extract zip archive ━━━━━━━━━━━━━━━━━━ 📌 Most Important Commands For Beginners → ls → cd → cat → grep → find → chmod → curl → top → ssh → tar Master these first. ━━━━━━━━━━━━━━━━━━ Linux is one of the most important skills in: • Cybersecurity • Cloud • DevOps • System Administration • Networking The terminal is where real learning starts. #Linux #CyberSecurity #DevOps #SysAdmin #CloudComputing

English
0
0
0
44