Stats: 3,248,680 members, 8,138,590 topics. Date: Saturday, 19 April 2025 at 03:34 AM |
Nairaland Forum / GodofwarKratus's Profile / GodofwarKratus's Posts
(1) (2) (of 2 pages)
![]() |
My mama get all the complete attributes.. Las las African mums are the best...be it good or bad |
![]() |
Him don die jare... Leave matters, How many cows d go use for the burial... Right now na cubana dey top |
![]() |
What's a million naira, let him increase the figure make we use technology find the yeye guys |
![]() |
Oyibo no go kill us with iPhone wahala.. ThankGod for techno and infinix phone... No be only apple 13 then no like pawpaw13 phone... Working boys go soon start to order am ..... 1 Like |
![]() |
slawormiir: Baba you morale for this forum... Na AK47 ooo E dey bust brain, dey correct pussy ass niggers to the right track...... Ekp repping your flow........ 1 Like 1 Share |
![]() |
Na wa ooo, so SQL injection is old skool Bro shows you're not a hacker at all... You don't have skills in hacking a web app is site if you're told to hack manually either using hackbar or the likes... If you want to learn how to hack both manually and use of the right tools in hacking WhatsApp me :08063492005 hacking is art, know the right tools to use, understand what youre doing Trainings are private.... 08063492005 |
![]() |
Covid-19 has changed a lot in the world and globally companies are always on the verge on protecting their information's, data from intruders, black hat hackers, spammers and the likes... Talking about hacking, its not a myth that you can be in your home controlling a server, system, industrial work stations remotely with your hacking skills... Topics to be taught and all are practical with real live hacking Reconnaissance... Knowing the right tools to use Fingerprinting...... Enumeration Manual hacking with hackbar using SQL injection, xss, crsf... From the web bar Web hacking.... Sqlmap, burpsuite, wpscan, sqlninja.. Advanced use of metasaploit and arnitage in hacking servers, and vulnerabilities Using of nmap ( basics, and advanced ways of hacking with nmap) How yo use of exploit pack in creating your own exploits Bypassing AV with your customised payloads Creating your shell to bypass IDS, WAF and other advanced softwares blocking your payload How to use various wevshells, like c99, aspx shell, cgi shell and metasploit shell with the help of ncat Bypassing admin privileges and policy using powersploit... And many others... Hacking is knowing the right tools to use and understanding the brains behinds other exploits.. To those only interested in hacking, penetration testing and security engineer, its a private training.... Hacking is not a science rocket project when you know the right recipes and tools... Many few people will tell you that its better you enroll in online training , which is right but having a one on one training makes it easier to increase your skills.... Call me on :08063492005. Also on WhatsApp You can't be a hacker through WhatsApp training always know that... Real live hacking, making it easier for you to understand latest tech companies are into in protecting their companies 08063492005 Start now to be a security analyst, cyber tech h3cker |
![]() |
Soonest thousands of accounts hackd on nairaland will be leaked before defacing it... |
![]() |
mcqwerty: |
![]() |
staffs in the firm do have access to it and youre told to penetrate such network took me 3 hours to figure it correctly that i could use javascript manually( creating my own malware) why javascript ! every browser enables and use it. thanks to armitage i was priviledge to pivot the network given to me, made me to scan hidden networks of few computers in the company, had to make my own network also to be able to accept TCP of incoming traffics with the help of wireshark. would stop here, at the end was able to infiltrate 14 systems beacon each other.. TO BE A WELL PROFFESSIONAL HACKER( KNOWING WHEN TO ATTACK AND RIGHT TOOLS TO USE. ENROLL NOW ON A PRIVATE ETHICAL HACKING TRAINING) We are now in an era of cyber world.. contact me:08063492005 1 Like |
![]() |
as i said earlier when penetrating a webserver and other services online or in a system, as being said when hacking it has its own rules to make it easier to document open ports,filtered and close port using few of the tools you have in your kali linux. knowing the services that are vulnerable like my self i prefer doing a domain scan to know the hidden sub domains in the server, smtp scan, knowing the security policy of the server. having few of this informations with me i can know if the service is vulnerable.. lets talk about sqlmap: i so much love it,reasons i can do many things with it like using metasploit with sqlmap, most times people have the intuition that sqlmap can hack any sites .. NO, only when you understand the inner depth of your server.. was given the chance to hack an intranet network never knew it was a different path on its own, wouldnt explain much on that but would highlight few tips on it. Have you ever notice most firms have a particular network that is not being used publicly only |
![]() |
Hello, most times i do see people posting on being a hacker with diverse skills and idea be it from manual hacking like sql injection,local file inclosure, using dorks and queries to detect vulnerabilites and the likes, we have the automated tools like those we have in SECURITY AND PENETRATION OS (KALI LINUX, BACKBOX, PARROT,BLACKARCH.) using tools like ssenump, theharvester,p0f,cms enuweration,smtp userenum,hydra,armitage,metasploit,medusa,nessus,w3af etc... being an hacker from white,grey,black hackers lies the power of knowing how and when to hack ,from my own knowledge one has to be able to understand few in and outs of programming languages hopeful few of it like basics html, javascript,php,python,css..the basics in sense understanding the languages.. as an hacker one of the ways in begining to hack you ought to know importants stuffs like .. what lang is the site using like php/mysql, php/apache,asp,html,nginx,perl and the likes, os of the site could be linux,windows,centos(linux),ubuntu(linux). |
![]() |
Hello, most times i do see people posting on being a hacker with diverse skills and idea be it from manual hacking like sql injection,local file inclosure, using dorks and queries to detect vulnerabilites and the likes, we have the automated tools like those we have in SECURITY AND PENETRATION OS (KALI LINUX, BACKBOX, PARROT,BLACKARCH.) using tools like ssenump, theharvester,p0f,cms enuweration,smtp userenum,hydra,armitage,metasploit,medusa,nessus,w3af etc... being an hacker from white,grey,black hackers lies the power of knowing how and when to hack ,from my own knowledge one has to be able to understand few in and outs of programming languages hopeful few of it like basics html, javascript,php,python,css..the basics in sense understanding the languages.. as an hacker one of the ways in begining to hack you ought to know importants stuffs like .. what lang is the site using like php/mysql, php/apache,asp,html,nginx,perl and the likes, os of the site could be linux,windows,centos(linux),ubuntu(linux). 1 Like |
![]() |
Hi ya ll, as we all know covid-19 has made the world to be in chaos now are you aware times like this hackers use opporturnities in hacking massively,and thats the beauty of it been creative( thinking out of the box) as long as youre a hacker be it for legal or malicious act knowin the right tools and attack makes you unique.. Private Training For Only Serious Folks Interested Wanting To Advance Their Skills In Pententesting/hacking: What Will You Learn, Manual Hacking With Sql Injection, Active And Passive Information(Reconissance), Understanding when to use exploits(perl, php,c,c++, python), encrypting your own payloads and remaining silent, camera survillance hacking, understanding exploits and vulnerabilities of wordpress, cms, joomla sites, know how hackers clone apps undectable to antivirus, bypass firewall and how messages can be hijacked through network loopholes ( lan, wan, intranet). hacking voip services and protecting your servers. interested:08063492005. ETHICALLY NOT FOR HARM |
![]() |
Witcher:just hear yourself typing foolishly without thinking, silly northern cunt. |
![]() |
Witcher:Just hear yourself !! you simply dont think before you type.. silly northern cunt |
![]() |
2 Likes |
![]() |
There is rapid growth in technologies, so there is growth in the risk associated with the technology. Ethical hacking helps to predict the various possible vulnerabilities well in advance and rectify them without incurring any kind of attack from outsiders. To beat a hacker, you need to think like one! As hacking involves creative thinking, vulnerabilities testing and security audits cannot ensur that the network is secure, to achieve this organization need to implement a defense -in-depth strategy by penetrating their networks to estimate vulnerabilities and expose them. Ethical hacking is necessary because it allows countering of attacks from malicious hackers by anticipating methods they can use to break into a system. Ethical hacking is a crucial component of risk assessment,auditing, counterfraud, best practices and good governance. It's used to identify risk and highlight the remedial actions, and also reduce information and communication technology (ICT) cost by resolving those vulnerabilities.... SKILLS OF AN ETHICAL HACKER.... Plateform knowledge: in depth knowledge of major operating system, such as Windows, Linux and UNIX . Network knowledge: in depth knowledge of networking concepts technologies and related hardware and software . Computer expert: should be a computer expert adept at technical domains. Security knowledge: has knowledge of security areas and related issues . Technical knowledge: has high technical knowledge to lunch the sophisticated attacks. Penetration testing methodology Information gathering , vulnerability analysis, external penetration, internal network penetration testing, router and switches penetration testing, firewall penetration testing, IDS penetration testing, wireless network, Denial of service penetration testing, password cracking, social engineering, source code penetration testing, web application testing, SQL injection, physical security, surveillance camera penetration testing, database penetration testing, VoIP testing, Cloud penetration testing, war dialing, email security testing, telecom and broadband testing, SAP penetration testing... Technology is evolving at an unprecedented rate, as a result ethical hackers and pentester are needed .. If interested In being an ethical hacker, a penetration tester join my private training : 08063492005... Knowledge is wealth. |
![]() |
There is rapid growth in technologies, so there is growth in the risk associated with the technology. Ethical hacking helps to predict the various possible vulnerabilities well in advance and rectify them without incurring any kind of attack from outsiders. To beat a hacker, you need to think like one! As hacking involves creative thinking, vulnerabilities testing and security audits cannot ensur that the network is secure, to achieve this organization need to implement a defense -in-depth strategy by penetrating their networks to estimate vulnerabilities and expose them. Ethical hacking is necessary because it allows countering of attacks from malicious hackers by anticipating methods they can use to break into a system. Ethical hacking is a crucial component of risk assessment,auditing, counterfraud, best practices and good governance. It's used to identify risk and highlight the remedial actions, and also reduce information and communication technology (ICT) cost by resolving those vulnerabilities.... SKILLS OF AN ETHICAL HACKER.... Plateform knowledge: in depth knowledge of major operating system, such as Windows, Linux and UNIX . Network knowledge: in depth knowledge of networking concepts technologies and related hardware and software . Computer expert: should be a computer expert adept at technical domains. Security knowledge: has knowledge of security areas and related issues . Technical knowledge: has high technical knowledge to lunch the sophisticated attacks. Penetration testing methodology Information gathering , vulnerability analysis, external penetration, internal network penetration testing, router and switches penetration testing, firewall penetration testing, IDS penetration testing, wireless network, Denial of service penetration testing, password cracking, social engineering, source code penetration testing, web application testing, SQL injection, physical security, surveillance camera penetration testing, database penetration testing, VoIP testing, Cloud penetration testing, war dialing, email security testing, telecom and broadband testing, SAP penetration testing... Technology is evolving at an unprecedented rate, as a result ethical hackers and pentester are needed .. If interested In being an ethical hacker, a penetration tester join my private training : 08063492005... Knowledge is wealth. |
![]() |
honestly Nigeria is a mess when it comes to cyber security, as you said there is much hope outside the country working as a pentester, ethical hacker, security engineers and the rest... Firms in Nigeria still have the negative illusion that hackers (white and grey hackers) are bad thanks to the media on that, most firms when they hear the word hacking they have this paranoid attitude... There is a lot different between a hacker, script kiddies and a yahoo boy... Nigerians still believes a yahoo boy can also be a hacker ( so wrong and lame) Bro if you have the opportunity in leaving the country to discover your potentials on cyber security... Brother no waste time ooo N:B... You can still make your self known in Nigeria, ask me how... Hack into a strong multi national firm server and have a POC of your research on vulnerabilities in their firms... In a more official way send it to the owner of the company in person or through mail and see if they won't employ you ( No harm done to their systems).... |
![]() |
@emmychukz, youre right about firms in nigeria focus more on web apps and devOPs majorly but would let you know companies hire/employ ethical hackers, pentesters guys also as security engineers, system analyst. we are moving gradually in a global tech environment that datas, informations, system policies that are confidential and important ought to be protected not until harm is been done. to clarify it hacking is very wide and has lots of varieties in it.. for the good of all and companies security ought to be an important key in any firms... |
![]() |
Been observing you lately, bae na symptoms for depression be this; sha take it easy life na jeje. 1 Like |
![]() |
Hello, y'all am a pentester, security analyst.if you're interested in been a pentester, ethical hacker be it from OWASP PENETRATION,SQL INJECTION, XSS,BY PASSING ROOT AND SERVER,ABLE TO IDENTIFY VULNERABLE SITES, DATA HACKING, ADVACED PHISHING, PORT REDIRECTING.. Contact me : 08063492005... Private teaching.. This is not just doing CEH STEPS, goes deep into real live scenario hacking ....NO SECURITY IS SECURE AND SAFE, ALWAYS KNOW THAT. |
![]() |
chiaa.. just negodu liverpool... i gat go chemist go buy purge medicine.. |
![]() |
Hello, y'all am a pentester, security analyst.if you're interested in been a pentester, ethical hacker be it from OWASP PENETRATION,SQL INJECTION, XSS,BY PASSING ROOT AND SERVER,ABLE TO IDENTIFY VULNERABLE SITES, DATA HACKING, ADVACED PHISHING, PORT REDIRECTING.. Contact me : 08063492005... Private teaching.. This is not just doing CEH STEPS, goes deep into real live scenario hacking ....NO SECURITY IS SECURE AND SAFE, ALWAYS KNOW THAT. |
(1) (2) (of 2 pages)
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2025 Oluwaseun Osewa. All rights reserved. See How To Advertise. 47 |