Which command would Solomon use to monitor network traffic in real time?
Anonymous Quiz
7%
ifconfig
15%
ping
61%
tcpdump
17%
route
โก3๐1
Solomon needs to find the IP address of his system. Which command can he use?
Anonymous Quiz
13%
ping
9%
hostname
4%
netstat
74%
ifconfig
๐ฅ5
๐2
| Protocol | Port |
___________________________________________
| DHCP | UDP port 67 (servers)
UDP port 68 (clients)
____________________________________________
| ARP | none
_____________________________________________
| Telnet | TCP port 23
_____________________________________________
| SSH | TCP port 22
_____________________________________________
| POP3 | TCP/UDP port 110 (unencrypted)
TCP/UDP port 995 (encrypted, SSL/TLS)
______________________________________________
| IMAP | TCP port 143 (unencrypted)
TCP port 993 (encrypted, SSL/TLS)
______________________________________________
| SMTP | TCP/UDP Port 25 (unencrypted)
______________________________________________
| SMTPS | TCP/UDP port 587 (encrypted, TLS)
___________________________________________
| DHCP | UDP port 67 (servers)
UDP port 68 (clients)
____________________________________________
| ARP | none
_____________________________________________
| Telnet | TCP port 23
_____________________________________________
| SSH | TCP port 22
_____________________________________________
| POP3 | TCP/UDP port 110 (unencrypted)
TCP/UDP port 995 (encrypted, SSL/TLS)
______________________________________________
| IMAP | TCP port 143 (unencrypted)
TCP port 993 (encrypted, SSL/TLS)
______________________________________________
| SMTP | TCP/UDP Port 25 (unencrypted)
______________________________________________
| SMTPS | TCP/UDP port 587 (encrypted, TLS)
๐ฅ5โค3๐1๐คฉ1
Forwarded from AASTU STUDENTS UNION OFFICIAL (AASTU_OFFICIAL Addis Ababa Science and Technology University)
Dear All,
Greetings from MoE,
We are excited to inform you about the government's new initiative, "5 Million Ethiopian Coders," launched with the support of partners. This initiative aims to provide free access to ICT-related courses through the Udacity platform, known for its high-quality, in-depth courses in programming, data science, artificial intelligence, and more.
Students and teachers can take advantage of this unique opportunity to enroll in these courses at no cost, which would otherwise be significantly expensive in USD. By participating in this program, our education community can enhance their skills and become highly competitive in the global market. The ultimate goal is not just to complete the courses but to achieve certification from Udacity, which is recognized by international organizations and can greatly enhance career prospects.
To facilitate access, we have prepared step-by-step guidelines and a video tutorial on how to register on the system and enroll in the courses. Please share this valuable information widely within your community through available media channels (email, social media, website, etc.) so that students and teachers can benefit from it, especially during the summer break.
This is a tremendous opportunity for personal and professional growth, and we encourage everyone to take full advantage of it.
This is the video link we prepared, and we have also attached the PDF guidelines:
https://youtu.be/-zSmhhD5qE4
Greetings from MoE,
We are excited to inform you about the government's new initiative, "5 Million Ethiopian Coders," launched with the support of partners. This initiative aims to provide free access to ICT-related courses through the Udacity platform, known for its high-quality, in-depth courses in programming, data science, artificial intelligence, and more.
Students and teachers can take advantage of this unique opportunity to enroll in these courses at no cost, which would otherwise be significantly expensive in USD. By participating in this program, our education community can enhance their skills and become highly competitive in the global market. The ultimate goal is not just to complete the courses but to achieve certification from Udacity, which is recognized by international organizations and can greatly enhance career prospects.
To facilitate access, we have prepared step-by-step guidelines and a video tutorial on how to register on the system and enroll in the courses. Please share this valuable information widely within your community through available media channels (email, social media, website, etc.) so that students and teachers can benefit from it, especially during the summer break.
This is a tremendous opportunity for personal and professional growth, and we encourage everyone to take full advantage of it.
This is the video link we prepared, and we have also attached the PDF guidelines:
https://youtu.be/-zSmhhD5qE4
YouTube
5 million Ethiopian coders Initiative - Step By Step Guide to Register on Udacity
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
๐คฉ6๐1
Overview Guide for Cybersecurity๐ก๐
1. Basics
โโโ Networking ๐
โ โโโ OSI Model
โ โ โโโ Layers 1-7, Functions
โ โ โโโ Encapsulation/Decapsulation
โ โโโ TCP/IP Suite
โ โ โโโ IPv4/IPv6, TCP/UDP
โ โ โโโ Protocol Ports, ICMP, ARP
โ โโโ Subnetting
โ โ โโโ CIDR, VLSM, Calculations
โ โ โโโ Supernetting
โ โโโ NAT/PAT
โ โ โโโ Types, Mechanisms
โ โ โโโ NAT Traversal
โ โโโ DNS
โ โ โโโ Resolution, DNSSEC
โ โ โโโ Spoofing, Tunneling
โ โโโ VPNs
โ โ โโโ IPSec, SSL/TLS
โ โ โโโ Split Tunneling
โ โโโ Firewalls
โ โ โโโ Stateful vs Stateless
โ โ โโโ NGFW, Rule Creation
โ โโโ Load Balancers
โ โโโ Layer 4/7, Health Checks
โ โโโ Algorithms, Session Persistence
โโโ Operating Systems ๐ป
โ โโโ Windows
โ โ โโโ Registry, AD, GPO
โ โ โโโ Event Logs
โ โโโ Linux ๐ง
โ โ โโโ Filesystem, Permissions
โ โ โโโ Systemd, Log Management
โ โโโ MacOS ๐
โ โ โโโ SIP, Keychain Access
โ โ โโโ Daemons, Gatekeeper
โ โโโ Kernel Exploits ๐
โ โ โโโ Privilege Escalation, CVE
โ โ โโโ Debugging, Exploit Dev
โ โโโ Shell Scripting ๐ฅ
โ โโโ Bash, PowerShell
โ โโโ Automation, Scheduling
โโโ Programming & Scripting ๐ก
โ โโโ Python ๐
โ โ โโโ Networking, Automation
โ โ โโโ API, Pentesting
โ โ โโโ Data Analysis
โ โโโ Bash
โ โ โโโ CLI Fu, Text Manipulation
โ โ โโโ Network Config, Process Management
โ โโโ PowerShell
โ โ โโโ Cmdlets, Remoting
โ โ โโโ Execution Policies, Admin Tasks
โ โโโ C/C++ ๐พ
โ โ โโโ Memory Management, Buffer Overflows
โ โ โโโ Pointer Manipulation, Exploits
โ โโโ Assembly Language ๐
โ โโโ x86/x64, Shellcode Dev
โ โโโ Debugging, Reverse Engineering
โ โโโ Reverse Engineering ๐
โ โโโ Disassembly, Decompilation
โ โโโ Binary Patching, Malware Analysis
2. Intermediate Security Skills ๐
โโโ Threat Modeling
โ โโโ STRIDE: Spoofing, Tampering, etc.
โ โโโ DREAD: Damage, Reproducibility, etc.
โ โโโ MITRE ATT&CK: Tactics, Techniques
โโโ Penetration Testing ๐ต๏ธโโ๏ธ
โ โโโ Reconnaissance: OSINT, DNS Recon
โ โโโ Scanning: Nmap, Nessus
โ โ โโโ Port Scanning, OS Detection
โ โ โโโ Vulnerability Prioritization
โ โโโ Exploitation: Metasploit, Custom Payloads
โ โ โโโ Shellcode, ROP
โ โ โโโ Fuzzing, Mitigation Bypass
โ โโโ Post-Exploitation: Privilege Escalation
โ โ โโโ Persistence, Data Exfiltration
โ โโโ Reporting: Documentation, Recommendations
3. Advanced Topics ๐
โโโ Offensive Security
โ โโโ Exploit Development
โ โโโ Advanced Persistent Threats (APTs)
โ โโโ Red Team Operations
โโโ Security Operations Center (SOC) ๐
โ โโโ Monitoring, Incident Response
โ โโโ SIEM Configuration
โ โโโ Threat Intelligence
โโโ Digital Forensics ๐ต๏ธโโ๏ธ
โ โโโ Data Acquisition
โ โโโ Evidence Preservation
โ โโโ Analysis & Reporting
โโโ Compliance & Governance ๐
โโโ GDPR, HIPAA
โโโ Risk Management
โโโ Policy Development
Join Us ๐๐๐๐๐๐๐๐๐๐๐๐๐
Youtube: http://www.youtube.com/@BunaByte
Facebook: https://www.facebook.com/BunaByte
Discord:https://discord.gg/khatGx6qAK
1. Basics
โโโ Networking ๐
โ โโโ OSI Model
โ โ โโโ Layers 1-7, Functions
โ โ โโโ Encapsulation/Decapsulation
โ โโโ TCP/IP Suite
โ โ โโโ IPv4/IPv6, TCP/UDP
โ โ โโโ Protocol Ports, ICMP, ARP
โ โโโ Subnetting
โ โ โโโ CIDR, VLSM, Calculations
โ โ โโโ Supernetting
โ โโโ NAT/PAT
โ โ โโโ Types, Mechanisms
โ โ โโโ NAT Traversal
โ โโโ DNS
โ โ โโโ Resolution, DNSSEC
โ โ โโโ Spoofing, Tunneling
โ โโโ VPNs
โ โ โโโ IPSec, SSL/TLS
โ โ โโโ Split Tunneling
โ โโโ Firewalls
โ โ โโโ Stateful vs Stateless
โ โ โโโ NGFW, Rule Creation
โ โโโ Load Balancers
โ โโโ Layer 4/7, Health Checks
โ โโโ Algorithms, Session Persistence
โโโ Operating Systems ๐ป
โ โโโ Windows
โ โ โโโ Registry, AD, GPO
โ โ โโโ Event Logs
โ โโโ Linux ๐ง
โ โ โโโ Filesystem, Permissions
โ โ โโโ Systemd, Log Management
โ โโโ MacOS ๐
โ โ โโโ SIP, Keychain Access
โ โ โโโ Daemons, Gatekeeper
โ โโโ Kernel Exploits ๐
โ โ โโโ Privilege Escalation, CVE
โ โ โโโ Debugging, Exploit Dev
โ โโโ Shell Scripting ๐ฅ
โ โโโ Bash, PowerShell
โ โโโ Automation, Scheduling
โโโ Programming & Scripting ๐ก
โ โโโ Python ๐
โ โ โโโ Networking, Automation
โ โ โโโ API, Pentesting
โ โ โโโ Data Analysis
โ โโโ Bash
โ โ โโโ CLI Fu, Text Manipulation
โ โ โโโ Network Config, Process Management
โ โโโ PowerShell
โ โ โโโ Cmdlets, Remoting
โ โ โโโ Execution Policies, Admin Tasks
โ โโโ C/C++ ๐พ
โ โ โโโ Memory Management, Buffer Overflows
โ โ โโโ Pointer Manipulation, Exploits
โ โโโ Assembly Language ๐
โ โโโ x86/x64, Shellcode Dev
โ โโโ Debugging, Reverse Engineering
โ โโโ Reverse Engineering ๐
โ โโโ Disassembly, Decompilation
โ โโโ Binary Patching, Malware Analysis
2. Intermediate Security Skills ๐
โโโ Threat Modeling
โ โโโ STRIDE: Spoofing, Tampering, etc.
โ โโโ DREAD: Damage, Reproducibility, etc.
โ โโโ MITRE ATT&CK: Tactics, Techniques
โโโ Penetration Testing ๐ต๏ธโโ๏ธ
โ โโโ Reconnaissance: OSINT, DNS Recon
โ โโโ Scanning: Nmap, Nessus
โ โ โโโ Port Scanning, OS Detection
โ โ โโโ Vulnerability Prioritization
โ โโโ Exploitation: Metasploit, Custom Payloads
โ โ โโโ Shellcode, ROP
โ โ โโโ Fuzzing, Mitigation Bypass
โ โโโ Post-Exploitation: Privilege Escalation
โ โ โโโ Persistence, Data Exfiltration
โ โโโ Reporting: Documentation, Recommendations
3. Advanced Topics ๐
โโโ Offensive Security
โ โโโ Exploit Development
โ โโโ Advanced Persistent Threats (APTs)
โ โโโ Red Team Operations
โโโ Security Operations Center (SOC) ๐
โ โโโ Monitoring, Incident Response
โ โโโ SIEM Configuration
โ โโโ Threat Intelligence
โโโ Digital Forensics ๐ต๏ธโโ๏ธ
โ โโโ Data Acquisition
โ โโโ Evidence Preservation
โ โโโ Analysis & Reporting
โโโ Compliance & Governance ๐
โโโ GDPR, HIPAA
โโโ Risk Management
โโโ Policy Development
Join Us ๐๐๐๐๐๐๐๐๐๐๐๐๐
Youtube: http://www.youtube.com/@BunaByte
Facebook: https://www.facebook.com/BunaByte
Discord:https://discord.gg/khatGx6qAK
โค5โก3๐2๐1
๐6๐2
๐ชฒThe best
https://malware-bit.medium.com/how-to-become-a-malware-analyst-ac8bc5ddc8f7
//Roadmap for someone who want to become Malware Analyst.https://malware-bit.medium.com/how-to-become-a-malware-analyst-ac8bc5ddc8f7
๐5๐1
Forwarded from Yekolo Temari (แจแแ แฐแแช)
Crack the Code at แณแแ Capture the Flag (CTF) Contest๐ต๏ธโโ๏ธ๐ป ๐
Ready to put your cybersecurity skills to the test? ๐ Join us for the แณแแ CTF contest, brought to you in partnership with ALX Ethiopia. ๐
This is your chance to dive into a series of challenging cybersecurity scenarios, from network hacking to web security. ๐ต๏ธโโ๏ธ๐ป
Experience the thrill of solving complex problems, competing against fellow enthusiasts, and discovering new techniques in a dynamic environment. The event will feature a range of tasks designed to push your limits and showcase your expertise. ๐
Event Details:
๐ Date: Saturday, September 7 (แณแแ 2)
โฐ Time: 1:00 PM - 6:00 PM (แจ7แก00 - 12แก00 แฐแ แต)
๐ Location: CITYPOINT ALX TECH HUB, HAYAHULET MAZORIA
๐ RSVP: bit.ly/3X7umTR
Ready to put your cybersecurity skills to the test? ๐ Join us for the แณแแ CTF contest, brought to you in partnership with ALX Ethiopia. ๐
This is your chance to dive into a series of challenging cybersecurity scenarios, from network hacking to web security. ๐ต๏ธโโ๏ธ๐ป
Experience the thrill of solving complex problems, competing against fellow enthusiasts, and discovering new techniques in a dynamic environment. The event will feature a range of tasks designed to push your limits and showcase your expertise. ๐
Event Details:
๐ Date: Saturday, September 7 (แณแแ 2)
โฐ Time: 1:00 PM - 6:00 PM (แจ7แก00 - 12แก00 แฐแ แต)
๐ Location: CITYPOINT ALX TECH HUB, HAYAHULET MAZORIA
๐ RSVP: bit.ly/3X7umTR
๐ฅ7๐คฉ2
What motivates you?
Anonymous Poll
46%
Money ๐ฐ
45%
Challenge ๐ช
15%
Revenge ๐ฟ
1%
Subversion
25%
Hacktivisim ๐ป
3%
Infamy
๐6๐2
