Get Mystery Box with random crypto!

Technical Devang

Logo of telegram channel technicaldevang — Technical Devang T
Logo of telegram channel technicaldevang — Technical Devang
Channel address: @technicaldevang
Categories: Education
Language: English
Subscribers: 1.84K
Description from channel

ᴍᴏʀᴇ ʏᴏᴜ sᴇᴀʀᴄʜ ᴍᴏʀᴇ ʏᴏᴜ ᴋɴᴏᴡ

instagram.com/technical_devang
Founder
🌐 protoncybersec.in
¯\_(ツ)_/¯
@Technicaldevang_bot

Ratings & Reviews

3.00

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

1

3 stars

1

2 stars

1

1 stars

0


The latest Messages 10

2021-07-08 05:10:39 https://www.udemy.com/course/applied-ethical-hacking-and-rules-of-engagement/?ranMID=39197&ranEAID=*7W41uFlkSs&ranSiteID=.7W41uFlkSs-eGlvVD5hSSRRIVQHKLZRIw&LSNPUBID=*7W41uFlkSs&utm_source=aff-campaign&utm_medium=udemyads&couponCode=C3A526EC23741CCC25E1
38 views02:10
Open / Comment
2021-07-06 14:03:59 https://www.udemy.com/course/the-owasp-top-10-demystified/?couponCode=81E0D38A002319EAD0B1

ONLY 23 HRS LEFT ENROLL FAST
163 views11:03
Open / Comment
2021-07-04 20:39:30 Computer Hacking Forensic Investigator (CHFI) | All Course Materials



Computer Hacking Forensic Investigation Is The Process Of Detecting Hacking Attacks And Properly Extracting Evidence To Report The Crime And Conduct Audits To Prevent Future Attacks.



Computer Hacking Forensics Investigator (CHFI)

01 Computer Forensics Introduction
02 Computer Forensics Process
03 Searching and Seizing
04 Digital Evidence
05 First Responder Procedures
06 Forensics Lab
07 Hard Disk and File Systems
08 Windows Forensics
09 Data Acquition and duplication
10 Recovering Deleted Files and Partitions
11 Using Access Data FTK
12 Using Encase
13 Password crackers
14 Log Correction
15 Network Forensics
16 Wireless Attack
17 Web Attacks
18 Email Crimes
19 Mobile investigation
20 Investigative Report
21 Expert Witness


Link:- https://mega.nz/folder/bUxVXB6T#Sk4IfPgjdCIDlF1THTXTKg
55 views17:39
Open / Comment
2021-07-04 16:19:41 Android bug hunting

https://www.instagram.com/p/CQ6Ao3Krda8/?utm_medium=copy_link
98 views13:19
Open / Comment
2021-06-30 09:07:31 Bug bounty guide



Identification and reporting of bugs and vulns in a responsible way.

All depends on interest and hardwork, not on degree, age, branch, college, etc.

What to study?

1. Internet, HTTP, TCP/IP
2. Networking
3. Command line
4. Linux
5. Web technologies, javascript, php, java
6. Atleast 1 prog language (Python/C/JAVA/Ruby..)

Choose your path (imp)

1. Web pentesting
2. Mobile pentesting
3. Desktop apps

Resources

1. Books

For web

1. Web app hackers handbook
2. Web hacking 101
3. Hacker's playbook 1,2,3
4. Hacking art of exploitation
5. Mastering modern web pen testing
6. OWASP Testing guide

For mobile

1. Mobile application hacker's handbook

Youtube channels

1. Hacking

1. Live Overflow
2. Hackersploit
3. Bugcrowd
4. Hak5
5. Hackerone

Programming

1. thenewboston
2. codeacademy

Writeups, Articles, blogs

1. Medium (infosec writeups)
2. Hackerone public reports
3. owasp.org
4. Portswigger
5. Reddit (Netsec)
6. DEFCON conference videos
7. Forums

Practice (imp)

Tools

1. Burpsuite
2. nmap
3. dirbuster
4. sublist3r
5. Netcat

Testing labs

1. DVWA
2. bWAPP
3. Vulnhub
4. Metasploitable
5. CTF365
6. Hack the box

Start!

Select a platform

1. Hackerone
2. Bugcrowd
3. Open bug bounty
4. Zerocopter
5. Antihack
6. Synack (private)

1. Choose wisely (first not for bounty)
2. Select a bug for hunt
3. Exhaustive search
4. Not straightforward always

REPORT:

5. Create a descriptive report
6. Follow responsible disclosure
7. Create POC and steps to reproduce

Words of wisdom

1. PATIENCE IS THE KEY, takes years to master, don't fall for overnight success
2. Do not expect someone will spoon feed you everything.
3. Confidence
4. Not always for bounty
5. Learn a lot
6. Won't find at the beginning, don't lose hope
7. Stay focused
8. Depend on yourself
9. Stay updated with infosec world

━━━━━━━━━━━━━
135 views06:07
Open / Comment
2021-06-30 04:56:08 https://www.udemy.com/course/network-programming-java-network-programming-nio-tcpip-sockets/?ranMID=39197&ranEAID=*7W41uFlkSs&ranSiteID=.7W41uFlkSs-njGEuV1W1c_0NApaCutSYQ&LSNPUBID=*7W41uFlkSs&utm_source=aff-campaign&utm_medium=udemyads&couponCode=NETWORKFREE
160 views01:56
Open / Comment
2021-06-25 10:34:59
136 views07:34
Open / Comment
2021-06-24 09:54:03 https://www.udemy.com/course/broad-scope-bug-bounties-from-scratch/?couponCode=9943A2D06E764688003B


1 DAY REMAINING ENROLL FAST
111 views06:54
Open / Comment