Olanrewaju Timilehin

105 posts

Olanrewaju Timilehin

Olanrewaju Timilehin

@Cybertimi06

Cybersecurity Specialist

เข้าร่วม Kasım 2024
73 กำลังติดตาม6 ผู้ติดตาม
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
Built a customer representative AI Agent for a medium scale business today.
Olanrewaju Timilehin tweet media
English
0
0
0
3
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
Built an AI chatbot. Many more things to learn though. I'll surely be there
Olanrewaju Timilehin tweet media
English
0
0
0
1
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
I extended my flow today by adding switch and conditions. Once a condition is met, an email is received by the end user.... Good progress
Olanrewaju Timilehin tweet media
English
0
0
0
1
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
Executed my first flow today. Form submission to Google Sheet automatically. Simple, but it is a learning process.
English
0
0
0
5
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
Made my first attempt with AI Automation today by creating my first trigger, which is on-form submission. Learning continues.
English
0
0
0
1
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
Day 2 of AI Automation. Today I signed up on n8n.io and also learnt how to run n8n locally using Docker.
English
0
0
0
3
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
For the next 30 days and more, the next line of knowledge addition would be AI Automation. Seems like the new go-to skill. Will be documenting my journey here
English
0
0
0
2
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
Key takeaways: thorough reconnaissance + methodical testing pays off, and even non-obvious artifacts (dotfiles, redirects, hidden pages) can be high-value in a CTF. Big win for practical learning — documented with screenshots and step-by-step evidence.
English
1
0
0
8
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
CTF / Red Team Pre-Challenge — Mission Accomplished I completed the INT403 Red Team Pre-Challenge (Capture The Flag) — a focused, hands-on exercise in offensive web enumeration and exploitation. Using tools like Nmap, Gobuster, curl, and Burp,
Olanrewaju Timilehin tweet mediaOlanrewaju Timilehin tweet media
English
1
0
0
19
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
Both analyses highlight how much insight can be gained through non-execution static techniques. Malware authors are increasingly combining obfuscation, API layering, and memory manipulation to bypass detection. But with tools like PEbear and FLOSS, and a bit of persistence,
English
1
0
0
18
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
🚨 Static Malware Analysis: Dual Case Study 🔍 Over the past few weeks, I’ve conducted static analysis on two suspicious Windows executables: Malware.Unknown.exe and RAT.Unknown.exe. Both samples were investigated without execution using tools like PEbear, FLOSS, and
Olanrewaju Timilehin tweet mediaOlanrewaju Timilehin tweet media
English
1
0
0
39
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
Gained shell access as the www-data user on the server ✅ This showed me the real danger of unsanitized input in web apps. It’s not just about bugs — it’s about control. 🔐 Key Lessons: Command injection can lead to remote code execution
English
1
0
0
7
Olanrewaju Timilehin
Olanrewaju Timilehin@Cybertimi06·
> 🧠💻 Ethical Hacking Lab: Reverse Shell via Command Injection Today I explored Command Injection using DVWA (Damn Vulnerable Web App) and successfully achieved a reverse shell, simulating how attackers gain remote access to vulnerable systems. 🔍 Steps I Took:
Olanrewaju Timilehin tweet media
English
1
0
1
10