Our third and final post (or is it?) on #OSINT data sources you should consider for penetration testing, bug bounties, threat intelligence and people investigations.
This time around, people investigations:
Thank you @hakluke and @dccybersec!
"As a bug bounty hunter, my goal is creativity. I am always trying to discover unique methods and edge cases to exploit and uncover things that others have not." - @hakluke
Check out Luke's favorite #bugbounty tools, the right hacker mindset, and more: securitytrails.com/blog/inte…
Wow, just checked my stats & realized I’m SO CLOSE to the (for me) almost magical 100k YT milestone. I can almost smell the plastic wrap of the plaque. 👃
Mad love & respect to all the creators out there that have put in the hours to educate / level up the cyber next gen 1/3
I'm so sick of seeing people struggle to get jobs in security. If you can't get beyond hiring people just like you or figure out which entry level folks will be successful, let me hire for you.
Seriously I've built whole teams this way. It's not that hard if you actually try.
I found out "C:\Windows\System32\WorkFolders.exe" (signed by MS) can be used to run arbitrary executables in the current working directory with the name control.exe. It's like a new rundll32.exe #lolbin but for EXEs!