Nana Sei Anyemedu Profile Banner
Nana Sei Anyemedu Profile
Nana Sei Anyemedu

@RedHatPentester

Followers
24,176
Following
613
Media
403
Statuses
10,625

Black Excellence | Amanfo) | Penetration Testing | Digital Forensics & Incidence Response| Offensive Security | Security Researcher | Man United❤

Saint Petersburg, Russia
Joined January 2021
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@RedHatPentester
Nana Sei Anyemedu
2 months
FARADAY BAG vs FLIPPER ZERO Today, I demonstrated the necessity of carrying a Faraday bag by using my Flipper Zero to read my bank card and access card. Without the Faraday bag, I successfully accessed both cards. However, when the cards were placed inside the Faraday bag, I
Tweet media one
Tweet media two
52
132
508
@RedHatPentester
Nana Sei Anyemedu
5 months
@ice_blockchain What the link $ICE Airdrop ?
8
5K
5K
@RedHatPentester
Nana Sei Anyemedu
5 months
@LayerZero_Labs @MorpheusAIs What the link $ICE airdrop ?
3
5K
5K
@RedHatPentester
Nana Sei Anyemedu
5 months
@sophon @ZentryHQ @BuildOnBeam link about Sophon whitelist ?
13
1K
2K
@RedHatPentester
Nana Sei Anyemedu
9 months
In this folder, you'll find SOP, Research Proposals, CV, Reference Letters templates, GRE, TOEFL & IELTS exams prep questions. Link: Enjoy❤️ Follow : @RedHatPentester
Tweet media one
28
1K
3K
@RedHatPentester
Nana Sei Anyemedu
1 year
EXPLOITING THE VULNERABILITY IN IPHONE AND ANDROID As a penetration tester and security researcher, I want to talk about SS7; a vulnerability that exist in iPhones and android. People don’t know about it. It can’t be patched. I don’t need to install malware on your phone
Tweet media one
69
759
3K
@RedHatPentester
Nana Sei Anyemedu
7 months
First of all, Hush was not a hacker. He belonged to a syndicate. Secondly,the only thing Hush can teach is social engineering. Take this from me. He is smart, no doubt. I think you did not read well about Hush and only fed on the information you found in online sources. Hush
@SirDavidBent
Sir David Onyemaizu🦍
1 year
Hushpuppi will comfortably school most of your tech founders when it comes to cyber-security. Why? He has first hand knowledge when it comes to loopholes in a given security system. Invictus Obi, on the other hand was named of the most talented entrepreneurs by Forbes. These
92
67
243
129
656
2K
@RedHatPentester
Nana Sei Anyemedu
9 months
Practical Ethical Hacking from Beginner level to advance level. Link : Follow @RedHatPentester Enjoy🤝
Tweet media one
52
819
2K
@RedHatPentester
Nana Sei Anyemedu
11 months
500 TB Tutorials + Books + Courses + Trainings + Workshops + Educational Resources 1. Data science 2. Python 3. Artificial Intelligence . 4. AWS Certified . 5. Cloud 6. BIG DATA 7. Data Analytics 8. Google Cloud Platform 9. IT Training 10. Machine Learning 11. Deep Learning 12.
26
521
2K
@RedHatPentester
Nana Sei Anyemedu
10 months
CYBERSECURITY GAMES AND SIMULATIONS Engaging in cybersecurity games and simulations can be a fun and effective way for pentesters and red teamers to enhance their skills and stay sharp. Here are some cybersecurity games tailored for professionals in these roles: 1. Hack The Box
25
470
1K
@RedHatPentester
Nana Sei Anyemedu
4 months
Don’t mess with China😂😂🙌🏽🙌🏽🙌🏽
93
510
1K
@RedHatPentester
Nana Sei Anyemedu
11 months
A company asked me to break into their CCTV. I did in 3 minutes. I streamed it on their VLC player through url. I’ll share the details of how I did it soon. But 2023; people still use default usernames and passwords🌚. By the way; this is my small hacking office in my room😂😂.
Tweet media one
58
159
1K
@RedHatPentester
Nana Sei Anyemedu
1 year
Hello my upcoming Hackers I’m dropping this here, it’s a free ethical hacking course from Cisco with 70 hours of content and 34 hands on labs. Make good use🎈. Link :
Tweet media one
Tweet media two
41
506
1K
@RedHatPentester
Nana Sei Anyemedu
6 months
I met this guy on LinkedIn today. He commented on a post; we linked up. He shared his number with me.He is a Ghanaian. He is very humble. He has experiences with FBI, Interpol and Department of Justice. He is an ethical hacker and an expert digital forensic officer. He is
76
201
1K
@RedHatPentester
Nana Sei Anyemedu
5 months
1. Ethical Hackers 2. Penetration Testers 3. Cyber Security Engineers 4. DevSecOps Engineers 5. Software Engineers 6. DevOps Engineers Follow @RedHatPentester #Retweet Download:
26
437
1K
@RedHatPentester
Nana Sei Anyemedu
1 year
Udemy Cybersecurity Master-course. Link: Foundation Network Security Hacker Attacks Web Application Security Malware @letcodeit 🤝🤝.
Tweet media one
30
413
1K
@RedHatPentester
Nana Sei Anyemedu
1 year
200+books on info sec and cybersecurity. Feel free to download any and read. LINK:
Tweet media one
13
444
1K
@RedHatPentester
Nana Sei Anyemedu
1 year
CompTIA CySA Download link: Enjoy❤️
Tweet media one
22
365
1K
@RedHatPentester
Nana Sei Anyemedu
1 year
Certified Information Systems Security Professional Study Guide (CISSP) Book Certified Information Systems Security Professional Study Guide (CISSP) Past Question Download: follow: @RedHatPentester
Tweet media one
18
332
1K
@RedHatPentester
Nana Sei Anyemedu
8 months
My small win💚. This is where I do everything Cybersecurity and Penetration Testing. My Home Office✨🤲🏽
Tweet media one
95
97
1K
@RedHatPentester
Nana Sei Anyemedu
1 year
I demonstrated to my colleagues and top men why it is a bad thing to insert any foreign iPhone cable, type C cable or USB into their mobile device or laptop. My malware through this cable was able to steal sensitive data from a fully Kaspersky and windows defender protected PC.
67
334
1K
@RedHatPentester
Nana Sei Anyemedu
1 year
CompTIA Security+ | SY0-601 book CompTIA security+ Past questions and answers Security+ Practice Test Network Basics for Hackers Download:
Tweet media one
29
314
989
@RedHatPentester
Nana Sei Anyemedu
2 months
In cybersecurity, what attack will this be😂😂
Tweet media one
258
125
899
@RedHatPentester
Nana Sei Anyemedu
3 months
Thank you Jesus for Everything. As Amazon, Google, Disney and all the big firm started as home offices; grant me the strength Lord to do exploit with the little I have🤍. This my Home Office; the place I do everything cybersecurity 💻 🤙🏽
Tweet media one
59
72
889
@RedHatPentester
Nana Sei Anyemedu
1 year
I have read this book like 4 times this year. What a Book❤️ This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks. Whether you’re an individual researcher or part of a
Tweet media one
22
204
771
@RedHatPentester
Nana Sei Anyemedu
9 months
Complete MCSE FREE Training: This comprehensive Training is a game-changer for anyone looking to master Microsoft's server technology and secure a career in Microsoft Windows Server 2019 Administration. Level up your skills! Follow @RedHatPentester Download Link:
Tweet media one
20
278
640
@RedHatPentester
Nana Sei Anyemedu
1 year
TRAFFIC LIGHT HACKING We frequently see movie scenarios when hackers are able to breach systems for the management of traffic lights, with devastating repercussions. This is a tested security research. Introduction Traffic lights are a critical component of urban
Tweet media one
12
247
795
@RedHatPentester
Nana Sei Anyemedu
1 year
Cybersecurity Tools By Category Information Gathering: >Nmap >Shodan >Maltego >TheHavester >Recon-NG >Amass >Censys >OSINT Framework >Gobuster Exploitation: >Burp Suite >Metasploit Framework >SQL Map >ZAP >ExploitDB >Core Impact >Cobalt Strike Password Cracking: >John The
15
235
762
@RedHatPentester
Nana Sei Anyemedu
1 year
CYBERSECURITY CERTIFICATIONS CompTIA Certifications •A+ •Network+ •Security+ •Linux+ •CASP + : CompTIA Advanced Security Practitioner •CySa+ : CompTIA Cybersecurity Analyst EC Council Certifications •CEH: Certified Ethical Hacker •CHFI: Computer Hacking Forensics
14
219
734
@RedHatPentester
Nana Sei Anyemedu
3 months
Another year older, another reason to be grateful. Happy birthday to myself. More successful years ahead🎉🎈🎊
Tweet media one
Tweet media two
219
54
766
@RedHatPentester
Nana Sei Anyemedu
1 year
Here are 20 cybersecurity YouTube channels: 1. Infosec Institute — Cybersecurity awareness. 2. Black Hat — Technical cybersecurity conferences. 3. Bugcrowd — Bug bounty methodology & interviews. 4. InfoSec Live — Tutorials & interviews. 5. David Bombal — Everything cybersecurity
11
231
716
@RedHatPentester
Nana Sei Anyemedu
1 year
PEN-200: Penetration Testing with Kali Linux. Enjoy it ❤️🔥 Happy Hacking. Download link:
Tweet media one
27
195
717
@RedHatPentester
Nana Sei Anyemedu
1 year
18 Linux commands every cybersecurity professional and enthusiasts should know🤍. If you don’t know, start learning🤝.
Tweet media one
12
174
703
@RedHatPentester
Nana Sei Anyemedu
5 months
CompTIA Courses for Free! 🕛 Follow @RedHatPentester for more Each CompTIA course and the link. Download: CompTIA A+ (2 CORES) (1101 & 1102) CompTIA Network+ (N10-008) CompTIA Security+ (SYO - 601)
23
372
717
@RedHatPentester
Nana Sei Anyemedu
1 year
API HACKING Application Programming Interface is referred to as API. Different software applications can communicate and interact with one another according to a set of rules and protocols. Applications' methods and acceptable data formats for information requests and sharing
Tweet media one
12
174
692
@RedHatPentester
Nana Sei Anyemedu
5 months
Russian Hackers are so good; they don’t compete but collaborate. The Shadow Brokers took on the NSA in just 14 minutes and leaked all the hacking tools on GitHub. They were in their systems for months without their notice. They even went on to advance their own tools and used it
23
153
672
@RedHatPentester
Nana Sei Anyemedu
7 months
Deep down I am still shocked how the American FBI used a Nintendo Switch to find an abducted girl😂. They were able retrieve the console's IP address and were able to locate the girl 11 days after she first disappeared. She was returned safely to her family. The same Nintendo we
40
181
649
@RedHatPentester
Nana Sei Anyemedu
8 months
I’m here again. If Nigeria wins this final, I’ll be doing a live wireless penetration testing session on password cracking and GSM Cell Tower Hacking via Microsoft teams for cybersecurity professionals for 2 consecutive saturdays. I don’t break my promise🤝. We cannot allow
126
141
633
@RedHatPentester
Nana Sei Anyemedu
4 months
Top 5% global contributors in the field of cybersecurity. Glad to get my badge today. More successful times ahead🤍
Tweet media one
38
57
661
@RedHatPentester
Nana Sei Anyemedu
5 months
If you send me a phishing link, I’ll reply with ransomware🤝.
92
115
612
@RedHatPentester
Nana Sei Anyemedu
4 months
Security is not for the weak🤍 Cybersecurity tool for information gathering⚡️
Tweet media one
20
85
612
@RedHatPentester
Nana Sei Anyemedu
1 year
CCNA made easy. This is the best ccna book I’ve seen so far❤️ Download:
Tweet media one
14
186
599
@RedHatPentester
Nana Sei Anyemedu
1 year
CCNA- Certification Guide CISCO CCNA LAB GUIDE v200 CISCO exams preparation 31 days CISCO syllabus Download: Follow @RedHatPentester for more.
Tweet media one
10
232
594
@RedHatPentester
Nana Sei Anyemedu
3 months
I carried out an attack today on my iPhone 12 Pro using the flipper zero. The Flipper device has a feature in the BLE spamming app that exploits a zero-day vulnerability related to BLE spamming. It sends specific packets that trigger BLE pop-ups, causing the phone to crash and
17
137
615
@RedHatPentester
Nana Sei Anyemedu
1 year
Microsoft Cybersecurity Analyst Professional Certificate Check out free pre-enrolment started. Here is the link to enroll
13
182
596
@RedHatPentester
Nana Sei Anyemedu
1 year
PEN-200: Penetration Testing with Kali Linux OSCP Certification 🔥🔥 Complete PDF + Videos  2023 Download link:  Enjoy❤️
Tweet media one
30
172
561
@RedHatPentester
Nana Sei Anyemedu
1 year
This is called TRIANGULATION. This was how Russian hackers in (Kaspersky lab) were able to find out they were being spied; they used wireshark and MVT. I challenge every cybersecurity professional and enthusiast to learn how to use these two tools: they help in mobile forensics.
Tweet media one
10
139
557
@RedHatPentester
Nana Sei Anyemedu
3 months
Best Cybersecurity Certifications FREE (Updated) Retweet and Share. ✅1. Introduction to Cybersecurity: ✅2. Cybersecurity Essentials: ✅3. Networking Essentials: ✅4. Intro to Information Security by
7
273
570
@RedHatPentester
Nana Sei Anyemedu
2 months
@itsFeyisayo No rich and responsible husband will eat a food that attracts lots of house flies. Decency is key. You need to visit an asylum
74
42
561
@RedHatPentester
Nana Sei Anyemedu
5 months
Encrypt your WhatsApp with Face ID and bring it to me; I’ll bypass that encryption with my mobile forensic software. The Israeli designers are so good that they gave the software capabilities to bypass this encryption🤍. Top tier.🙌🏽🙌🏽
48
75
543
@RedHatPentester
Nana Sei Anyemedu
11 months
Radio Pentesting . Radio signals can be recorded and replayed to your disadvantage. Opening the door of a building with Hackrfportapack. Doors are the targets now. This for educational purpose.
14
102
538
@RedHatPentester
Nana Sei Anyemedu
1 year
Here are 10 ports commonly targeted by hackers: 1. Port 21 (FTP) 2. Port 22 (SSH) 3. Port 23 (Telnet) 4. Port 25 (SMTP) 5. Port 53 (DNS) 6. Port 80 (HTTP) 7. Port 443 (HTTPS) 8. Port 3074 (Xbox Live) 9. Port 5060 (SIP) 10. Port 8080 (Proxy)
8
162
514
@RedHatPentester
Nana Sei Anyemedu
1 year
Cybersecurity is so addictive: I’m still performing malware analysis at this time of the day. God please let me sleep; I’m not a wizard😂😂
Tweet media one
44
44
488
@RedHatPentester
Nana Sei Anyemedu
8 months
We cannot allow Nigeria to win tonight or we are dead🤝😂😂
368
44
464
@RedHatPentester
Nana Sei Anyemedu
11 months
I think cybersecurity professionals should start building a team of 4. I want to build a team of 4 personally: Software engineer Programmer Networking engineer And a Hacker. There’s a reason for this. You people will be the best team ever🤍🙌🏾🙌🏾
39
93
481
@RedHatPentester
Nana Sei Anyemedu
11 months
Tomorrow I am going to show you how Law Enforcement Agencies tap into your phone calls. The problem with radio hacking is that instead of one number, you’ll end up sniffing on a lot of numbers. Stay tuned for tomorrow 😂❤️
19
65
468
@RedHatPentester
Nana Sei Anyemedu
5 months
I will upload the NSA tools shadow brokers leaked and share the url with you. . Feel free to download but I am not responsible for your use. I’ll collaborate with few people to modify and use few of the tools for good🤝.
52
63
481
@RedHatPentester
Nana Sei Anyemedu
11 months
BECOME MORE COMFORTABLE WITH NMAP 1. Nmap Basic Scanning nmap -sV [host]  // Version Detection, default scan nmap -sS [host]  // SYN Stealth Scan nmap -sU [host]  // UDP Scan nmap -sT [host]  // TCP Connect() Scan nmap -sN [host] // TCP Null Scan nmap -sF [host] // TCP FIN Scan
10
150
482
@RedHatPentester
Nana Sei Anyemedu
1 year
PENETRATION TESTING Penetration testing, often referred to as pen testing or ethical hacking, is a proactive and systematic approach to assessing the security of computer systems, networks, applications, and physical infrastructure. Its primary purpose is to identify
18
157
479
@RedHatPentester
Nana Sei Anyemedu
5 months
When Extremes Meet. With my Boss @cisco
Tweet media one
39
39
464
@RedHatPentester
Nana Sei Anyemedu
1 year
IMSI CATCHERS (STINGRAYS) IMSI Catchers, also referred to as "Stingrays," are specialised monitoring tools designed to intercept and keep track of mobile communications within a particular geographical region. Due to their potential for intrusive and warrantless surveillance,
Tweet media one
15
129
466
@RedHatPentester
Nana Sei Anyemedu
9 months
A Goldmine of Free Ethical Hacking, Blueteaming and Penetration Testing Coursing Download: Follow @RedHatPentester for more. Retweet
Tweet media one
11
176
458
@RedHatPentester
Nana Sei Anyemedu
11 months
CARD SKIMMING Meet this device. It is a card skimmer and writer. Capable of reading your card numbers by radio as well reading them by swipe. It uses capable of reading 9 type of cards. Once the magstripe is swiped past the reading head, the embedded data is decoded by the
21
170
460
@RedHatPentester
Nana Sei Anyemedu
4 months
Formed my organization in Level 100 years ago. After 8 years, H. I. V. E is a successfully registered cybersecurity company. More successful times ahead🤍 Please I need a correct designer for logos.
59
46
461
@RedHatPentester
Nana Sei Anyemedu
9 months
Drone Penetration Testing💚 Faking GPS has become my thing now. You have to lie to that drone and cause it do emergency landing😂. Also know that, GPS spoofing can be done with the Hackrf one and the drone can also be hacked with a wireless adapter. Prioritize safety
Tweet media one
Tweet media two
21
60
429
@RedHatPentester
Nana Sei Anyemedu
4 months
My Snapchat users; are you aware that the moment Snapchat blocks you, they don’t only block your account but blocks your device because when you registered from the onset; the application registers your IMEI number on their servers. My advice; anytime you want to buy an iPhone;
38
227
432
@RedHatPentester
Nana Sei Anyemedu
7 months
A friend got a role in GRC just two days ago, and I tell you, though I helped her prepare for it; GRC is not my thing. If you make a mistake, you will deviate. She has asked me to share her interview questions. The interview lasted just 45 minutes: Technical knowledge and
18
125
422
@RedHatPentester
Nana Sei Anyemedu
11 months
The top 10 wireshark filters every cybersecurity professional should know: 1. Filter by IP Address: To capture traffic to or from a specific IP address, you can use the following filter: ip.addr == x.x.x.x 2. Filter by Port: To capture traffic on a specific port, use the
5
109
410
@RedHatPentester
Nana Sei Anyemedu
1 year
Dragon OS is a very powerful OS for radio penetration testing. It contains over 100 strong tools to aid you filter the air for information. Using Kali Linux is not really an effective advise I’d give to anyone who wants to study radio hacking.
19
76
403
@RedHatPentester
Nana Sei Anyemedu
1 year
COMPLETE LINUX FILE SYSTEM BROKEN DOWN. 📁 / ∟ 📄boot ∟ 📁bin ∟ 📄ls ∟ 📄mkdir ∟ 📁dev ∟ 📄sda ∟ 📁etc ∟ 📄hostname ∟ 📄passwd ∟ 📄nginx .conf ∟ 📁home ∟ 📁user1 ∟ 📄.bashrc ∟ 📁user2 ∟ 📄notes.txt ∟
7
98
397
@RedHatPentester
Nana Sei Anyemedu
1 year
@Solomon_Buchi There’s an element of truth in what he’s saying. Open your eyes
10
3
367
@RedHatPentester
Nana Sei Anyemedu
7 months
Before the American FBI will process you for court, then they have all evidence and charges against you. Unless God comes through for you like how He did for Marcus Hutchins ~ Malware Tech😂😂🤝. He was arrested in US when he went for DEFCON. He’s the only cybersecurity
Tweet media one
26
95
380
@RedHatPentester
Nana Sei Anyemedu
6 months
I’ll be forming a strong cybersecurity team to develop exploit tools used ethically to fight crime. Here are my concepts I’ve developed so far for exploits: 1. Tarzan: A tool to compromise wireless networking devices such as routers and access points. It will allow the us to
80
75
384
@RedHatPentester
Nana Sei Anyemedu
1 year
CYBERSECURITY FOR AUTOMOBILES Cybersecurity for autonomous vehicles, often referred to as "connected cars," is a critical concern due to the potential safety risks associated with cyberattacks on these vehicles. Here are some key aspects of cybersecurity for autonomous vehicles:
Tweet media one
8
119
382
@RedHatPentester
Nana Sei Anyemedu
1 year
CYBERSECURITY AND MATHEMATICS Mathematics plays a vital role in the theory and practice of cybersecurity. Mathematical concepts and techniques are used to develop secure cryptographic algorithms, analyze cyber threats, model security risks, and optimize cybersecurity
29
94
380
@RedHatPentester
Nana Sei Anyemedu
9 months
Offensive Security Proving Grounds I have uploaded some videos from the OSCP for penetration testing. This is a gold mine. Please retweet and follow @RedHatPentester Purely practical Download:
Tweet media one
9
172
379
@RedHatPentester
Nana Sei Anyemedu
3 months
Cybersecurity folks let’s gather here. This bag here is the faraday box (bag). This bag here protects your cell phones, tablets, and other electronics from location tracking, hacking, and damage by blocking all incoming and outgoing EMF signals between 200 MHz and 40 GHz,
Tweet media one
31
99
387
@RedHatPentester
Nana Sei Anyemedu
4 months
A Udemy Bug Bounty course for my Bug Hunters Follow @RedHatPentester Download:
Tweet media one
16
130
382
@RedHatPentester
Nana Sei Anyemedu
1 year
Mobile Pentesting and Forensics is amazing. The goal is to investigate your phone. I successfully broke into an iPhone 11 without jailbreaking it with the use of the forensic tool that I purchased. I got access to 6GB of the phone log files. SMS Messages from iCloud and sim
Tweet media one
Tweet media two
Tweet media three
Tweet media four
6
71
365
@RedHatPentester
Nana Sei Anyemedu
7 months
My Mega folder is updated. My cybersecurity people. These are 20 Offensive and Bug Bounty tools for Ethical Hacking and Penetration Testing. Download link: Follow @RedHatPentester for more. #Retweet
Tweet media one
Tweet media two
20
149
366
@RedHatPentester
Nana Sei Anyemedu
1 year
Are you ready my junior and senior Penetration Testers? I purchased this course at $65 to share for you guys. Files uploading. Be expecting it soon. Follow @RedHatPentester BURP SUITE MASTERY: BUG BOUNTY PERSPECTIVE. UDEMY. What you’ll learn? Burp suite community edition
Tweet media one
29
74
366
@RedHatPentester
Nana Sei Anyemedu
5 months
@Wizarab10 Davido’s crime was to be born into a rich family?
64
10
345
@RedHatPentester
Nana Sei Anyemedu
6 months
This is the biggest misconception out there. Yahoo doesn’t come close to ethical hacking. Is just like that guy saying Hushpuppi will school cybersecurity professionals . They are two different things; yahoo yahoo is social engineering and ethical hacking is legally breaking
@chude__
Chudé
6 months
“The Government need to employ Yahoo boys as ‘ethical hacker’” Agree?
255
70
227
48
94
366
@RedHatPentester
Nana Sei Anyemedu
6 months
PROJECT OWL RECON - DIGITAL FORENSICS This is an investigation of an iPhone 15 Pro Max. This investigation took me 21 hours, 55 minutes. Items of 56GB of data were extracted. The map showed the geoposition of everywhere the suspect has been in the last 7 months. Everything
Tweet media one
Tweet media two
Tweet media three
69
77
364
@RedHatPentester
Nana Sei Anyemedu
1 year
PENETRATION TESTING Types of Penetration: There are several types of penetration testing, each with a specific focus: - Black Box Testing: Testers have no prior knowledge of the target system and approach it as an external attacker would. -White Box Testing: Testers have
8
98
309
@RedHatPentester
Nana Sei Anyemedu
6 months
OSINT TOOLS 1. Google Search: A powerful search engine for finding publicly available information on the web. 2. Social Media Platforms: Platforms like Twitter, Facebook, LinkedIn, and Instagram provide valuable insights into individuals, organizations, and events. 3. Maltego:
11
166
355
@RedHatPentester
Nana Sei Anyemedu
5 months
@kwadwosheldon You were ones using phone camera for your videos. Everything be time.
16
11
364
@RedHatPentester
Nana Sei Anyemedu
1 year
If you’re entering into cybersecurity, make sure you have at least 4 emails. I have 9 emails; Each with different passwords💙. This tactics is very good and strategic for all cybersecurity professional and enthusiasts .
25
76
351
@RedHatPentester
Nana Sei Anyemedu
1 year
HACKING AND PEN-TESTING. FREE ($80). Learn practical hacking and pentesting with a step by step guide. A hands on approach to learn practical ethical hacking. The ultimate Practical Hacking and Pentesting Guide for Beginners. Learn Ethical Hacking and Penetration Testing!
Tweet media one
29
104
356
@RedHatPentester
Nana Sei Anyemedu
2 months
Yes we know hacking without permission is illegal but in most cases that I’ve read especially on firms in USA and Russia, you’ll either be recruited by the company or the Feds if your skill is vital like this. You’ll just face community services as punishment because you’re
@SaharaReporters
Sahara Reporters
2 months
Nigerian Police Arraign Two Students For Hacking MTN System, Stealing N1.9billion Airtime, Data | Sahara Reporters
Tweet media one
190
346
1K
59
80
363
@RedHatPentester
Nana Sei Anyemedu
1 year
I saved to buy this 7 years ago; you all can have it. Make good use of it🙌🏾. CompTIA Pentest+ PT0-002 ( Ethical Hacking & Pentest+ ) Lab 🔥 Download Link:
Tweet media one
17
137
353
@RedHatPentester
Nana Sei Anyemedu
1 year
Download the e-book here❤️:
Tweet media one
19
89
348
@RedHatPentester
Nana Sei Anyemedu
11 months
ELEVEN CYBERSECURITY PROVERBS 1. "A chain is only as strong as its weakest link." 2. "Security is not about risk elimination, but risk management." 3. "The best defence is a good offence." 4. "Trust, but verify." 5. "An ounce of prevention is worth a pound of cure." 6.
9
119
348
@RedHatPentester
Nana Sei Anyemedu
1 year
You have to learn NETWORKING very well if you love cybersecurity. During pentesting in 2021, I was able to shut down the entire communication system of a company because they had only two DNS servers for their critical infrastructure (Emails, internet, phone systems & websites)
11
46
347
@RedHatPentester
Nana Sei Anyemedu
1 year
Want to study eJPT(v2) for free? The eLearnSecurity Junior Penetration Tester exam (eJPT) validates that an individual has the knowledge and skills needed to fulfill a role as an entry-level penetration tester. Access resources:
Tweet media one
8
152
339
@RedHatPentester
Nana Sei Anyemedu
2 months
WHY YOU SHOULDN’T SEND YOUR PHONE DURING PROTESTS In February this year I did an educational live demo on how IMSI catchers are used to get IMSI numbers of phones in a geographical area using the Hackrf. This is an aspect of radio Pentesting aimed at surveillance in most cases.
23
217
352
@RedHatPentester
Nana Sei Anyemedu
1 year
Teaching Cybersecurity has never been easy. Teaching cybersecurity demands a dynamic approach, staying current with the field, and addressing the diverse needs of students while emphasizing ethical responsibility. Virtual class sessions are so tedious yet we make sure things are
Tweet media one
14
32
327
@RedHatPentester
Nana Sei Anyemedu
9 months
Dear Newbie, In wireless penetration testing, you need to first get a laptop, then a wireless adapter, and also get a handshake before you can crack passwords. In order to crack a Wi-Fi password using tools like airodump-ng and aircrack-ng, you typically need to capture a
Tweet media one
25
87
332