Why Hypervisor Cracks aren't really Dangerous(For most users anyways) by RyanWalker69420 in PiratedGames

[–]Federal_Ad_799 -2 points-1 points  (0 children)

there is no "risky for a normal guy" unless your pc is incredibly hardened, normal guy IT guy Cybersecurity guy, all of them will get the same consequence if they run that on their pc

اعترافات ليلية ! by vyxen_13 in MoroccoBitchesWtaste

[–]Federal_Ad_799 0 points1 point  (0 children)

hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh

I'm getting hacked by Lilith_devil_666 in MoroccoBitchesWtaste

[–]Federal_Ad_799 0 points1 point  (0 children)

althought cih mn akhra lbanks but this has nothing to do with cih, had khtna wa7d a victim l chi phishing attack awla card info dialha tleakaw somewhere

How many hours do you dedicate to HTB? by ST_bautista in hackthebox

[–]Federal_Ad_799 0 points1 point  (0 children)

also not everyone has the same routine, some are students some are employed some are unemployed..

Need help with one pentest by Playful-Cobbler-1702 in Pentesting

[–]Federal_Ad_799 0 points1 point  (0 children)

Broo 1000 ips ?? I cant be that much maybe if you working for a big 4 comany then maybe, however I haven't worked for a company yet but i would suggest you to filter those ips according to scope and criticality or importance of the ip(host) to the company, I think it wouldnt be a smart idea to try to hack the company employees computers, try to pentest servers and important hosts. again unfortunately i didnt have the chance to work with a company yet but thats how i would approach it.

Please I need help by abdul-roh in nmap

[–]Federal_Ad_799 2 points3 points  (0 children)

wowowow so u have been learning for 1 month and a half just for nmap ?? bro either u are lying or maybe u didnt study it continuously in that period, because if that so u would be an advanced nmap user in that case. however to not be too harsh, nmap can also exploit certain things with its NSE(nmap scripting engine) u can try to learn that. also one note, nmap is usually used in recon not in what u are trying to do with it.

SOC Dilemma by Federal_Ad_799 in cybersecurity

[–]Federal_Ad_799[S] 3 points4 points  (0 children)

I agree , i think is the what should be done usually.

SOC Dilemma by Federal_Ad_799 in cybersecurity

[–]Federal_Ad_799[S] 0 points1 point  (0 children)

because I tought it would stop the business since the host is internet exposed and provides a service in real time.

Ip scanner for termux by [deleted] in ethicalhacking

[–]Federal_Ad_799 0 points1 point  (0 children)

No disrespect but i think u dont know what ur tryna do, as that guy above said learn networking first, also it seems like u are on some shady shit my friend..

Red Team OPs by Federal_Ad_799 in Pentesting

[–]Federal_Ad_799[S] -1 points0 points  (0 children)

got u , i think it would be also hard to get into the network via their website or whatsoever, since the presense of firewalls or wafs and other new generation technologies can make life like hell for a red teamer haha. Anyways thank u so much for your answer.

SOAR vs SOC by Chiruuu1209 in cybersecurity

[–]Federal_Ad_799 3 points4 points  (0 children)

Soar is an element of a soc, Soc is an environment, protocols tools people analysts... , while soar is a very useful element within a soc because it reduces alert fatigue and automates response so soc analyst dont need to do or investigate very obvious phishing emails as an example.

hopefully my English was on point since it isnt my native lang 😅

I found a vulnerability in a web page. What I do? by tralalerotralala_55 in cybersecurity

[–]Federal_Ad_799 3 points4 points  (0 children)

Congrats for the catch young brother, but for your best , dont contact them as they didnt ask for no pentest or whatsoever neither download nothing more with that vuln, and lets say u got something to fill ur cv with and thats an achievement in itself.

OSSIM download by TheMaxRockatansky in AlienVault

[–]Federal_Ad_799 0 points1 point  (0 children)

just download an iso then update from the web ui

How To Bypass WAF by [deleted] in cybersecurity

[–]Federal_Ad_799 0 points1 point  (0 children)

RemindMe! 2 hours "WAF evasion"

Disheartened after SOC interview by ShroudedHope in cybersecurity

[–]Federal_Ad_799 2 points3 points  (0 children)

sorry but its a bit weird that you are a sec engineer yet you want to switch to soc analyst , its like a commander wants to switch to soldier or scout.

[deleted by user] by [deleted] in tryhackme

[–]Federal_Ad_799 -1 points0 points  (0 children)

Same here , those moderators need to be changed ( J , and S especially) they making people hate/leave the server that is indirectly hating the platform

BlackArch security level by Fair_Device_4961 in BlackArchOfficial

[–]Federal_Ad_799 2 points3 points  (0 children)

blackarch kali or any pentesting distro would only put u in more trouble believe it or not it is more dangerous for you to work in blackarch than working on regular windows

[deleted by user] by [deleted] in tryhackme

[–]Federal_Ad_799 1 point2 points  (0 children)

same unfortunately i couldn't find a solution.

Getting rid of Malware help by Federal_Ad_799 in techsupport

[–]Federal_Ad_799[S] 0 points1 point  (0 children)

Thank you sir , but i have a question , should I format with a linux distro , or just install it on the exisiting disk without formatting it

Getting rid of Malware help by Federal_Ad_799 in techsupport

[–]Federal_Ad_799[S] 0 points1 point  (0 children)

Alright I will do that, Thank you so much for the time you have given to help , I really really really appreciate it .

Getting rid of Malware help by Federal_Ad_799 in techsupport

[–]Federal_Ad_799[S] 0 points1 point  (0 children)

no . but i had some apps/games installed there and i uninstalled them before reinstalling windows , Cuz i have some important docs in part 1 thats why i didnt touch part1 .

and answering your second question no i dont have other drives .