Winston Ighodaro Profile Banner
Winston Ighodaro Profile
Winston Ighodaro

@Officialwhyte22

Followers
3,666
Following
164
Media
244
Statuses
1,668

Ethical Hacker Security+, Network+, Pentest+, and CNVP. Python, bash, Powershell, VBS, Java script, Html and C#. I am root

Root
Joined June 2022
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@Officialwhyte22
Winston Ighodaro
3 days
1
5
16
@Officialwhyte22
Winston Ighodaro
2 months
Just another day on Forensics 🙂‍↕️😔 How many have you used??
Tweet media one
59
163
2K
@Officialwhyte22
Winston Ighodaro
5 days
🤣🤣
6
189
1K
@Officialwhyte22
Winston Ighodaro
3 months
Top 5 Search Engines Hackers Use 🚨 1. Shodan is called the "search engine for Internet-connected devices." This search engine allows users to locate IoT devices and various unsecured systems around the world. Hackers can, of course, look for device types—industrial control
Tweet media one
7
131
293
@Officialwhyte22
Winston Ighodaro
1 month
Day 28 #30daysofhacking Used my WiFi Pineapple to setup a rouge access point and perform a man-in-the middle attack🤗
Tweet media one
6
25
284
@Officialwhyte22
Winston Ighodaro
3 months
If you are a member of my private hackers group, rejoice! We will go over this to help you gain hands-on! Starting with honeypot setup. Join my Private Hackers group now. Link in bio🚨
@SecurityTrybe
Security Trybe
3 months
50 Cybersecurity Project Ideas Beginner To Expert
Tweet media one
22
223
1K
5
52
269
@Officialwhyte22
Winston Ighodaro
4 months
Phishing 😈🚨 So I revisited a tool I made some months back. It's an advanced Bitcoin phishing tool! It kicks in as soon as the victim accesses the fake login or verification page, grabbing their IP address and accessing their webcam in a sneaky way. Plus, it logs every
Tweet media one
Tweet media two
Tweet media three
Tweet media four
32
28
235
@Officialwhyte22
Winston Ighodaro
2 months
🔐 30 Days of Hacking Challenge!🔥 I’m kicking off a 30-day hacking challenge starting on the 1st of September , and I want YOU to join! 🧑‍💻 Whether it’s CTFs, ehacking platforms, or learning from a book, let’s level up together. Interested? Drop a comment below, and I'll share
Tweet media one
139
40
225
@Officialwhyte22
Winston Ighodaro
3 months
Network Footprinting🚀 Network footprinting is a process in cybersecurity that involves gathering essential information about a target network to understand its structure and identify potential vulnerabilities. Steps in Network Foot-printing 1. Identification of IP Addresses
Tweet media one
6
50
219
@Officialwhyte22
Winston Ighodaro
2 months
Common ports loved by hackers 😈📌 Save this 🔥
Tweet media one
7
48
224
@Officialwhyte22
Winston Ighodaro
3 months
Cyber moment 😈 What is the primary purpose of a firewall in network security? A. To encrypt the data B. To monitor and control incoming and outgoing network traffic C. To perform regular software updates D. To detect and remove malware Don't cheat, answer first!!
161
22
190
@Officialwhyte22
Winston Ighodaro
5 months
Still struggling with Linux? I gat you 😈 I have written a script in python to help beginners get a hold on Linux and Windows commands. This is just to help beginners catch up. If you are already a pro you might not need this. This script is very simple and easy to use, all you
Tweet media one
Tweet media two
11
58
183
@Officialwhyte22
Winston Ighodaro
4 months
Ethical hacking tutorial 💻 In this guide, I will demonstrate how a malicious actor might execute a VNC brute force attack to gain unauthorized access and control over a targets computer. Virtual Network Computing (VNC) is a graphical desktop-sharing system that allows one
6
43
185
@Officialwhyte22
Winston Ighodaro
5 months
My story, My mission. Hello cyber enthusiasts, Get ready for an exciting story, ayyy!! My name is Winston Ighodaro. I'm a Pentester/Ethical Hacker, Blogger, Christian and a Nigerian. This story is going to be fun, so grab your coffee and keep reading! I got my first break in
26
42
151
@Officialwhyte22
Winston Ighodaro
2 months
Network+ 🌐 A technician needs to limit access to specific websites for users on the network. Which network device is best suited to perform this task? A) Router B) Firewall C) Switch D) Hub Lets go😈
63
15
146
@Officialwhyte22
Winston Ighodaro
3 months
One of my students tried to outsmart me with a phishing attempt after reading my book on webcam exploitation 😂. I opened the link and discovered he was using my tool 😈. Guess my book is working too well! 📖💻
Tweet media one
Tweet media two
12
18
146
@Officialwhyte22
Winston Ighodaro
2 months
Sec+🔒 What technique involves intercepting communication between two parties without altering the data to gather information? A) Man-in-the-Middle (MitM) B) Packet Sniffing C) DNS Spoofing D) ARP Poisoning Let’s go😈
77
17
132
@Officialwhyte22
Winston Ighodaro
4 months
🚨 What is DNS Bombing?🚨 DNS bombing, also known as DNS cache poisoning, is a nasty type of DDoS attack. Attackers exploit DNS protocol weaknesses by sending spoofed DNS queries to open DNS resolvers. These resolvers then send a flood of large DNS responses to the target
Tweet media one
11
57
131
@Officialwhyte22
Winston Ighodaro
3 months
Cyber Sunday 😈 In hacking, what is the primary purpose of using a “honeypot”? A. To capture malicious traffic and study attackers behavior. B. To strengthen encryption protocols and prevent data breaches. C. To disrupt communication between an attacker and the server . D.
Tweet media one
70
17
130
@Officialwhyte22
Winston Ighodaro
5 months
Scammers will scam! 🕵️‍♂️ I recently had a run-in with some scammers and decided to turn the tables using my Python skills. I whipped up a Python script that embeds JavaScript into a PDF, allowing me to track their every move. Trust me, the scammers were surprised 💀. It just goes
Tweet media one
Tweet media two
Tweet media three
16
38
133
@Officialwhyte22
Winston Ighodaro
4 months
TryHackMe & Hack The Box are fantastic for gamified learning in cybersecurity, but don’t stop there. Balance your time to acquire real-world skills through hands-on projects and networking. Real-world experience is key! #CyberSecurity
3
20
131
@Officialwhyte22
Winston Ighodaro
3 months
Linux malware 🚨😈 Be careful when cloning and running scripts on your machine, some may contain malware that could cause harm to your machine. Most Linux users are so quick to type “git clone” 😂 I have written an nmap script in python that contains malware and when you run
9
37
122
@Officialwhyte22
Winston Ighodaro
5 months
For those who were on @CybarikGlobal space on Phishing, Vishing and Smishing. I mention that hackers can use pdf and word documents to carry out phishing. Just for enlightenment here’s a python script that does the trick. This script Converts txt into pdf, embeds malicious java
Tweet media one
8
34
107
@Officialwhyte22
Winston Ighodaro
5 months
Ping of Death attack 🚀 For educational purposes only! The "Ping of Death" attack involves sending maliciously oversized ping(ICMP) packets to a target system, causing it to crash or become unresponsive. This exploit leverages vulnerabilities in the way systems handle fragmented
5
32
108
@Officialwhyte22
Winston Ighodaro
1 month
Day 21 #30daysofhacking Had some fun with my email bomber tool Which sends emails from spoofed email addresses and ip addresses to the targets email every 60 seconds! It has the ability to evade spam folder, customise headers and add malicious links. Some might think blocking
Tweet media one
Tweet media two
Tweet media three
5
16
107
@Officialwhyte22
Winston Ighodaro
3 months
Learn how to setup and use Honey Pots to detect, monitor and analyze cyber threats and attackers behavior. Join my Private group with the link in my bio. Class starts On Monday 29th of July!!!!!
Tweet media one
9
20
101
@Officialwhyte22
Winston Ighodaro
2 months
Port scanning is like checking the doors and windows of a house to see which ones are open or closed. In the world of computers, "doors and windows" are like "ports," which are entry points where data can come in or go out of a system. When a computer or network device is
5
46
102
@Officialwhyte22
Winston Ighodaro
3 months
🚨 Honeypot in Action!🚨 In my latest class in my Private Hackers group we set up both FTP and Web honeypots to capture and analyze potential intrusions. The FTP honeypot simulated a vulnerable FTP server, allowing us to monitor the actions of curious visitors and also gain
Tweet media one
Tweet media two
Tweet media three
Tweet media four
7
15
101
@Officialwhyte22
Winston Ighodaro
4 months
Understanding the OSI Model🚀 🔍 What is the OSI Model? The OSI (Open Systems Interconnection) model is a framework used to understand how different networking protocols communicate across seven layers. It standardizes network functions, enabling multi-vendor interoperability
Tweet media one
5
48
100
@Officialwhyte22
Winston Ighodaro
3 months
Cyber moment😈 Which of the following is a sign that an organization might be experiencing a DDoS attack? A. Gradual increase in network traffic over time B. Sudden spike in network traffic from multiple sources C. Decrease in network traffic D. Increase in the number of
98
14
97
@Officialwhyte22
Winston Ighodaro
3 months
What does the term “zero-day exploit” refer to? A) An attack that occurs at midnight. B) An exploit for which no patch is available. C) A virus that activates immediately. D) A software vulnerability discovered on its release day. Don't cheat, answer first 😈
84
17
92
@Officialwhyte22
Winston Ighodaro
5 months
🔍 How Hackers Cover Their Tracks: Wiping Windows Logs🕵️‍♂️ 1. Delete Event Logs: Hackers use tools like ‘wevtutil’ to clear event logs. wevtutil cl System wevtutil cl Security wevtutil cl Application 2. Remove Specific Entries: Advanced attackers selectively
Tweet media one
4
25
90
@Officialwhyte22
Winston Ighodaro
2 months
Exploited a vulnerable Apache Druid service using Metasploit. Ran into a few command quirks along the way, but nothing that couldn't be handled😈 One hack at a time🚀
7
15
88
@Officialwhyte22
Winston Ighodaro
2 months
Sec+ 🔒 Which of the following security controls would be most effective in preventing an attacker from accessing a corporate network by simply guessing user passwords? A. Firewalls B. Account lockout policy C. Password complexity requirements D. Encryption protocols Don't
71
14
85
@Officialwhyte22
Winston Ighodaro
25 days
OSI Layers and Attacks 🔥🚀 The Application layer includes browsers and word processors, often targeted by exploits to embed malicious code. At the Presentation layer, phishing is a key threat. The Session layer faces hijacking attacks. Hackers do reconnaissance at the
Tweet media one
1
22
86
@Officialwhyte22
Winston Ighodaro
2 months
Day 12 #30daysofhacking Today, I exploited the #BlueBorne vulnerability on an Android device! BlueBorne allows attackers to exploit devices via #Bluetooth without pairing, unlike #BlueBug , which targets the pairing process. I was able to execute commands like getting contacts,
@SecurityTrybe
Security Trybe
2 months
Can I be hacked via Bluetooth? A thread 👇
Tweet media one
4
118
624
9
15
84
@Officialwhyte22
Winston Ighodaro
5 months
Eternal-Exploit is a tool I wrote in python that is similar to Eternal Blue, if you don’t know about Eternal Blue - This script can be used to remotely execute arbitrary code on a vulnerable windows system without authentication. Once it has successfully
15
27
81
@Officialwhyte22
Winston Ighodaro
2 months
DNS footprinting refers to the process of scanning a given domain in order to recover details about the DNS records, and mapping how all these online services are structured. For example, if someone wanted to know how a company's website and email systems were setup, then there
Tweet media one
3
26
76
@Officialwhyte22
Winston Ighodaro
4 months
🚨 WiFi Stealer in Python! 😈 Here's a powerful WiFi stealer I developed in Python. This tool operates with lightning speed and remains undetectable by antivirus software. Setting it up is a breeze – you can configure it with either a server (for optimal speed) or an email
Tweet media one
Tweet media two
9
16
76
@Officialwhyte22
Winston Ighodaro
4 months
Nmap Scanning Tool in Bash In cybersecurity, Nmap is a powerful and versatile tool used for network discovery and security auditing. To make Nmap even more accessible and user-friendly, I've created a script named "MR-Nmap." This script is designed to simplify the process of
Tweet media one
3
13
76
@Officialwhyte22
Winston Ighodaro
4 months
Public Key Infrastructure (PKI) is like the secret handshake of secure online communication, using digital certificates to verify identities and keep data safe. 📚Story time😈 Some months back, An organization had an issues with their PKI system. An employee got phished, and
Tweet media one
2
24
74
@Officialwhyte22
Winston Ighodaro
5 months
🔥 Get Ready for a Linux Adventure! 🔥 I'm hosting a live technical demo on Linux on Saturday, June 8th, (10am-12pm- USA, 3pm-5pm -Nigerian time )🌟 in @allenharper community, Whether you're a beginner or a pro, this session on Skool will have something for everyone. Let's
Tweet media one
14
40
74
@Officialwhyte22
Winston Ighodaro
4 months
Hacking tutorial🚨 For educational purposes only!! In this guide, we will learn how to brute force a web form using THC-Hydra. We will be using a wordlist that has been generated using the Crunch utility. Using Burp Suite and THC-Hydra we will be able to automate a brute force
Tweet media one
1
25
75
@Officialwhyte22
Winston Ighodaro
5 months
Get Started Today, Become an Ethical Hacker/Cybersecurity professional 💻 Are you overwhelmed with where to start in your cybersecurity/ethical hacking journey? You may have noticed the mountain of information to consume. You can find tons of free information out there, but
Tweet media one
7
18
74
@Officialwhyte22
Winston Ighodaro
4 months
Hacking has become an integral part of who we are. It's not just a profession, but a passion that fuels our curiosity and creativity. We hack because it's in our blood—it's what we live for.
Tweet media one
5
9
74
@Officialwhyte22
Winston Ighodaro
2 months
Evil-pdf 🔥 Evil-pdf can be used to deliver malware to the target, redirect them to a malicious site (as seen in the video) or run malicious code (e.g Powershell) on the targets machine. Evil pdf also comes with some sites to help with malware delivery, all you have to do is
9
21
71
@Officialwhyte22
Winston Ighodaro
2 months
🚨 30 Days of Hacking Challenge! 🚨 Join me starting September 1st, 2024, for an epic hacking journey! Each day, dive into a hacking activity—whether it's solving a CTF, practicing from a cybersecurity book, or working on your own projects (No hack is too small). Share your
@Officialwhyte22
Winston Ighodaro
2 months
🔐 30 Days of Hacking Challenge!🔥 I’m kicking off a 30-day hacking challenge starting on the 1st of September , and I want YOU to join! 🧑‍💻 Whether it’s CTFs, ehacking platforms, or learning from a book, let’s level up together. Interested? Drop a comment below, and I'll share
Tweet media one
139
40
225
20
17
72
@Officialwhyte22
Winston Ighodaro
2 months
Sec+ 🔒🧑🏼‍💻 A cybersecurity team is deploying a new Intrusion Detection System (IDS) that needs to detect both known and unknown threats in real-time. Which type of IDS is MOST suitable for this purpose? A) Signature-based IDS with a robust update system B) Anomaly-based IDS
33
8
71
@Officialwhyte22
Winston Ighodaro
2 months
Day 10 #30daysofhacking I created a script that can generate fake WiFi networks. The script allows you to either provide a list of WiFi names from a text file or specify a custom network to clone. If neither option is provided, it will randomly generate WiFi networks. ps: I’ll
3
11
72
@Officialwhyte22
Winston Ighodaro
3 months
I remember hosting a class on IDS, and my students were amazed when I demonstrated real-time detection. We used a custom Intrusion Detection System (IDS) that binds to your IP address and network interface, monitoring for TCP, UDP, and ICMP packets. It watches your traffic
8
14
71
@Officialwhyte22
Winston Ighodaro
1 month
Sniffing Tools and Techniques 🔥🔥 Sniffing is like eavesdropping on network conversations. It involves using tools to capture data traveling over a network. This can help in understanding what’s happening on the network or, in some cases, capturing sensitive information like
Tweet media one
7
23
71
@Officialwhyte22
Winston Ighodaro
5 months
👾 Want to level up your info-gathering game? Check out Ghost-Hunter, a tool I wrote when I was 17yo! 🕵️‍♂️ 💻 Capabilities: 1️⃣ IP Tracker: Extract detailed info on any IP address—know your target inside out. 2️⃣ Show Your IP: Quickly find your own public IP to stay under the radar.
Tweet media one
Tweet media two
Tweet media three
8
22
69
@Officialwhyte22
Winston Ighodaro
15 days
@Officialwhyte22
Winston Ighodaro
2 months
Day 12 #30daysofhacking Today, I exploited the #BlueBorne vulnerability on an Android device! BlueBorne allows attackers to exploit devices via #Bluetooth without pairing, unlike #BlueBug , which targets the pairing process. I was able to execute commands like getting contacts,
9
15
84
0
14
70
@Officialwhyte22
Winston Ighodaro
29 days
Today, I am filled with immense gratitude and pride as I share some exciting news. I have been honored with not just one, but two prestigious invitations to join honor societies. Starting my journey in cybersecurity at the age of 14, I never imagined it would lead to such
Tweet media one
Tweet media two
18
18
69
@Officialwhyte22
Winston Ighodaro
5 months
Exciting news! Our community is growing strong, and I'm thrilled to announce an upcoming class on ethical hacking. Join us to learn, share, building! This meeting will be held in my community. Don't miss out! 💻✨ Join my community, link in my bio Let's goo!!!! #EthicalHacking
Tweet media one
2
19
66
@Officialwhyte22
Winston Ighodaro
3 months
I appreciate all the feedback on today’s class. As promised, I have made the tool demonstrated in class available to you on GitHub. If you missed today’s class on 'Nmap for Hackers,' you can watch the recording in the Public Hackers Community. To clone this tool, use the command
Tweet media one
Tweet media two
7
8
66
@Officialwhyte22
Winston Ighodaro
2 months
Uncovering Cybersecurity Breaches Using Forensic Analysis: Giggly Goofo Breach🧑🏼‍💻 Giggly Goofo, a game development company, had its sensitive data exposed in a significant breach. My goal? Uncover the method of entry, trace the attackers, and investigate any potential inside
5
14
66
@Officialwhyte22
Winston Ighodaro
2 months
Network+ 🌐 Which of the following is used to ensure that data packets can be reassembled in the correct order when they arrive at their destination over a TCP/IP network? A) Window size B) Sequence numbers C) ACK flag D) TTL value Test yourself 😈💯
27
6
64
@Officialwhyte22
Winston Ighodaro
5 months
We all know that Nmap is the ultimate network scanning tool. But let's be real, manually running those scans can be a real drag. That's why I've created this Wonderful piece - a game-changer that will have you scanning networks like a true ninja master! All in bash🚀 Follow for
Tweet media one
Tweet media two
11
19
66
@Officialwhyte22
Winston Ighodaro
4 months
Tools to Hack WordPress 🚀😈 For educational purposes🚨 WordPress powers over 835M sites. Understanding how it works deeply is key for hacking WordPress. There are various tools that can be used to hack WordPress sites but today we will only list a few 1. Searchsploit
Tweet media one
7
25
63
@Officialwhyte22
Winston Ighodaro
3 months
Fellow Nigerians, Within the past couple of months, there has been a worrying spike in cyber-attacks around the world. Few days ago I heard about the 1million naira that was stolen, more reason I decided to drop this. These hackers have been quite advanced with their modes of
Tweet media one
Tweet media two
Tweet media three
Tweet media four
8
27
62
@Officialwhyte22
Winston Ighodaro
4 months
Autofill 😈 Hackers can steal your personal information using “Autofill”. The trick behind this is the field are hidden from you but not from autofill/your browser so its basically filing fields you can’t see🫨. To avoid this, type your information manually!!!! Stay safe😈
4
27
61
@Officialwhyte22
Winston Ighodaro
3 months
Importance of using a VPN 🚨🔥 Sarah is a frequent traveler and often works from different coffee shops. One of those days, when she was working, she typed some work-related sensitive emails and sent them out over the public Wi-Fi network at a café. A few days later, she was
Tweet media one
9
17
61
@Officialwhyte22
Winston Ighodaro
5 months
Just breathed new life into an old friend! Converted one of my old Windows laptop to Linux and it's like a whole new machine! Faster, lighter, and more secure. Can’t wait to run my first hack with this machine💀 #LinuxConversion #Hackingtime
Tweet media one
Tweet media two
6
7
61
@Officialwhyte22
Winston Ighodaro
3 months
Cyber Tuesday 😈🚀 You’ve connected to a public Wi-Fi network and want to capture traffic data to analyze for potential vulnerabilities, but you want to do it strictly via the command prompt on your machine. Which of the following tools would be best to use ? A. Nmap B.
Tweet media one
37
4
57
@Officialwhyte22
Winston Ighodaro
2 months
Sec+ 🔒 An organization suspects that it is being targeted by an Advanced Persistent Threat (APT) that may be exploiting a zero-day vulnerability in its web application. What is the most effective immediate action to minimize the impact? A) Patch the suspected vulnerability
48
8
57
@Officialwhyte22
Winston Ighodaro
5 months
Unleash your inner hacker with these top 10 Nmap commands! Top 10 Nmap Commands: 1️⃣ nmap -sS -Pn -T4 (Stealthy SYN scan) 2️⃣ nmap -sV -p (Version scan) 3️⃣ nmap -O (OS detection) 4️⃣ nmap -sU -p (UDP scan) 5️⃣ nmap -A (Aggressive scan) 6️⃣ nmap -p 22
Tweet media one
1
18
56
@Officialwhyte22
Winston Ighodaro
3 months
Come learn the hidden secrets of Nmap and how hackers use Nmap! Join my community (link in bio) for more information and link to the meeting. RT to spread the goodnews!
Tweet media one
3
20
57
@Officialwhyte22
Winston Ighodaro
4 months
Hacking Tip🚀 "Most hackers don't break in; they log in. Social engineering is often more effective than technical exploits." – Winston Ighodaro.
Tweet media one
2
9
56
@Officialwhyte22
Winston Ighodaro
5 months
Join my group classes and 1x1 classes to Learn Linux and hacking! Polish your skills in hacking!!!!
Tweet media one
26
8
53
@Officialwhyte22
Winston Ighodaro
4 months
What is DNS? 🌐 DNS (Domain Name System) is like the phonebook of the internet. It translates human-friendly domain names (like ) into IP addresses (like 192.0.2.1) that computers use to identify each other on the network. How DNS Works 1. User Request
Tweet media one
6
30
55
@Officialwhyte22
Winston Ighodaro
3 months
The Simple Mail Transfer protocol (SMTP) is a protocol for sending emails in an IP network. It can be used between an email client and an outgoing mail server or between two SMTP servers. By default, SMTP servers accept connection requests on port 25. However, newer SMTP servers
Tweet media one
2
15
54
@Officialwhyte22
Winston Ighodaro
4 months
🚨Ransomware Attacks🔒 Ransomware encrypts your valuable data on an infected system demanding a ransom for decryption. It often enters the victims Pc through phishing emails or exploits system vulnerabilities, locking files on the infected computer but leaving the OS functional
Tweet media one
4
17
54
@Officialwhyte22
Winston Ighodaro
3 months
Zero Trust Network Security🚀 Zero Trust is a key cybersecurity model of modern networks designed and constructed based on one core assumption: 'Untrusting' everybody by default—inside and outside the network. Any type of device, user, or process has to identify itself every
Tweet media one
3
13
52
@Officialwhyte22
Winston Ighodaro
4 months
One careless click is all it takes for hackers to break in —think before you click. 💀
Tweet media one
2
21
50
@Officialwhyte22
Winston Ighodaro
3 months
If you want to get hands-on in Ethical Hacking join my Free mentoring community (link in bio) we are starting a challenge to help newbies build skills. I will be giving vouchers to winners💯 Join now!!!!
Tweet media one
3
19
46
@Officialwhyte22
Winston Ighodaro
3 months
How SSL/TLS Keeps You Safe Online🚀 When you shop online or log into your bank, your personal information needs to stay safe. SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are like locks that protect your data as it travels from your computer to the website
Tweet media one
3
22
47
@Officialwhyte22
Winston Ighodaro
5 months
Meet Hydra 🐉🐉, the ultimate nuisance. It follows the rule “cut off one head, and two shall arise.” Try to close it, and it duplicates itself. If too many pop up, your PC slows down, and your screen becomes a Hydra playground, hiding all your work! 😂 #CyberSecurity #Malware
Tweet media one
7
8
45
@Officialwhyte22
Winston Ighodaro
5 months
Hacking Metasploitable SQL Database🚨 A group of people reached out to me that they are unable to hack into the MySQL DB of metasploitable as the connection will always break unexpectedly! I wrote a python script to troubleshoot this. It conducts a brute force attack on the
5
9
45
@Officialwhyte22
Winston Ighodaro
3 months
What does the ‘ping’command do? A. Measures the speed of a network B. Sends ICMP echo requests to test connectivity C. Scans for open port D. Encrypts data Don't cheat, answer first🚀
55
9
45
@Officialwhyte22
Winston Ighodaro
5 months
Here are 5 sneaky ways hackers can bypass 2FA and gain access to your account. Educational purposes only lol 😈 1. Phishing attacks Phishing attacks trick users into revealing their 2FA codes or authenticator app secrets through fake emails, messages, or websites. 2. Session
1
22
45
@Officialwhyte22
Winston Ighodaro
4 months
I appreciate all my mentees out there, you all motivate me to do more!!! Today was a huge success and tomorrow will be better. Join my private hackers group to get hands on skills!! Link in bio
@BlessingOw44768
Blessing Owolabi
4 months
My day was fulfilled today because I was able to use this script to send out mail from my Linux machine, and it doesn't get delivered at the spam box.... So interesting 🤔 Kudos to mentor for this script 👏 The journey of cybersecurity #CyberSecurity #cybergeneration
Tweet media one
2
1
17
3
3
43
@Officialwhyte22
Winston Ighodaro
3 months
DNS Records 🚀🚀 A - Returns an IPv4 address of the requested domain as a result. AAAA - Returns an IPv6 address of the requested domain. MX - Returns the responsible mail servers as a result. NS- Returns the DNS servers (nameservers) of the domain. TXT - This record can
Tweet media one
0
10
43
@Officialwhyte22
Winston Ighodaro
4 months
Giving out tryhackme vouchers in my community! Join my community for more details Link in bio!!!!😈
6
2
43
@Officialwhyte22
Winston Ighodaro
2 months
Sec+ 🔒 Which of the following is the best method to prevent unauthorized devices from accessing a corporate wireless network? A) MAC address filtering B) Disable SSID broadcast C) WPA2 encryption D) Use of a captive portal
19
3
43
@Officialwhyte22
Winston Ighodaro
1 month
Day 27 #30daysofhacking Just Eternalblue 😈🔥
Tweet media one
5
10
41
@Officialwhyte22
Winston Ighodaro
4 months
The Task Manager💻 The Task Manager is a built-in system utility in Microsoft Windows that allows users to view and manage running processes, monitor system performance, and troubleshoot issues. It provides valuable information and tools to control what's happening on your
Tweet media one
1
15
42
@Officialwhyte22
Winston Ighodaro
2 months
I have released a detailed blog post on “Evil-pdf” for more clarity!
Tweet media one
@Officialwhyte22
Winston Ighodaro
2 months
Evil-pdf 🔥 Evil-pdf can be used to deliver malware to the target, redirect them to a malicious site (as seen in the video) or run malicious code (e.g Powershell) on the targets machine. Evil pdf also comes with some sites to help with malware delivery, all you have to do is
9
21
71
2
11
41
@Officialwhyte22
Winston Ighodaro
29 days
🙂Long day but had some fun setting up a Windows Server with IIS to handle web requests. 😅 I tweaked the firewall settings using PowerShell to allow HTTP traffic. Then, hopped into SQL Server Management Studio (SSMS) to access the database and ran a quick query.
Tweet media one
Tweet media two
Tweet media three
1
6
42
@Officialwhyte22
Winston Ighodaro
2 months
I just dropped a detailed post on Web Honeypots on my website. This is a must read if you want to know more about Honeypots.
Tweet media one
2
11
40
@Officialwhyte22
Winston Ighodaro
3 months
Zero trust is a new generation of security in which each device is continuously authenticated and verified with activities either from the user or the process, whether within or outside the network perimeter. Traditional models often give trusts to too many internal entities;
Tweet media one
1
19
41
@Officialwhyte22
Winston Ighodaro
2 months
📌📌
Tweet media one
2
10
40
@Officialwhyte22
Winston Ighodaro
3 months
Understanding WPA2 Hacking🌐 Today we're going to be looking at a very important area in wireless security: how to hack WPA2—Wi-Fi Protected Access II. Understanding how WPA2 can be compromised can be very important for both protecting your own networks and understanding
Tweet media one
2
20
40
@Officialwhyte22
Winston Ighodaro
3 months
Automobile hacking 🚀 Vehicle network hacking involves capturing and analyzing CAN bus traffic in search of commands controlling some vehicle functionality to later manipulate them. First thing to do is capture the CAN bus traffic and we can achieve this using : ‘can dump -c -l
Tweet media one
2
16
40
@Officialwhyte22
Winston Ighodaro
3 months
Just released my first video on my YouTube channel 😈 please do well to watch, like and subscribe🤗🤗 Link 👇
Tweet media one
3
6
39
@Officialwhyte22
Winston Ighodaro
1 month
Day 16 30daysofhacking Turned my flash drive into a Bad Usb with the help of a friend, Max , to emulate a keyboard. Twas a bit complex but 🤗. First we had to identify the controller used in the flash drive and “ChipGenius” was helpful , next we modified the firmware to
2
8
40
@Officialwhyte22
Winston Ighodaro
4 months
Exciting News! My new ebook, Webcam Vulnerability Exploitation and Malware Creation with Python, launches on Monday 15th of July ! 🎉 Trust me this book is loaded. Get an early purchase coupon for 10% off! Use code EARLYOFFER at checkout. Don't miss out on this essential guide
Tweet media one
Tweet media two
8
21
39
@Officialwhyte22
Winston Ighodaro
4 months
Hacking tutorial 😈 Steps to encrypt usb drive with VeraCrypt Hello learners, today we will be learning how to encrypt USB drive with password for mission critical operations. Encryption is the art of securing digital information from access by unwanted parties. Over the years,
Tweet media one
2
10
39
@Officialwhyte22
Winston Ighodaro
3 months
Cyber Monday, Test yourself 🚀🔥 Go through the riddle below and answer the question. I silently watch every key that you press, I hide in the shadows, causing distress. Your secrets I steal, your moves I track, But I'm not seen, so you won't fight back. What am I? A.
Tweet media one
53
7
38
@Officialwhyte22
Winston Ighodaro
2 months
🚨 Cron Job Exploitation: Gaining Root Access 🚨 Day2 #30daysofhacking I exploited a misconfigured cron job to gain root access on a target system. By finding writable scripts and injecting a reverse shell, I was able to escalate privileges effectively. I've written a
2
6
38