techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#pentesting

13 posts11 participants0 posts today
13reak :fedora:<p>Yay, I passed my CARTP!</p><p><a href="https://infosec.exchange/tags/CARTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CARTP</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Azure</span></a></p>
13reak :fedora:<p>Anyone did the HTB AD Pentester already? Is it good?</p><p><a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/hackthebox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackthebox</span></a> <a href="https://infosec.exchange/tags/activedirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activedirectory</span></a></p>
S1M0N3<p>BlackArch Linux on Artix:<br>Installing and configuring BlackArch packages on Artix Linux (XFCE), optimizing build settings, and updating the system with pacman while monitoring resources and processes in real time using Conky, htop, and neofetch.<br><a href="https://mastodon.social/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArchLinux</span></a> <a href="https://mastodon.social/tags/Artix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Artix</span></a> <a href="https://mastodon.social/tags/BlackArch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackArch</span></a> <a href="https://mastodon.social/tags/XFCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XFCE</span></a> <a href="https://mastodon.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysAdmin</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a></p>
Chema Alonso :verified:<p>El lado del mal - MITRE ATLAS: El framework para auditar la seguridad de un sistema de Inteligencia Artificial <a href="https://www.elladodelmal.com/2025/08/mitre-atlas-el-framework-para-auditar.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">elladodelmal.com/2025/08/mitre</span><span class="invisible">-atlas-el-framework-para-auditar.html</span></a> <a href="https://ioc.exchange/tags/ATLAS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ATLAS</span></a> <a href="https://ioc.exchange/tags/IA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IA</span></a> <a href="https://ioc.exchange/tags/MITRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITRE</span></a> <a href="https://ioc.exchange/tags/ATTACK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ATTACK</span></a> <a href="https://ioc.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://ioc.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentest</span></a> <a href="https://ioc.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://ioc.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://ioc.exchange/tags/Ciberseguridad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ciberseguridad</span></a> <a href="https://ioc.exchange/tags/InteligenciaArtificial" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InteligenciaArtificial</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Pivotnacci is a toolkit for network pivoting in pentesting. It automates SOCKS proxies, SSH tunnels, and port forwards, making lateral movement more efficient during red team operations. Great for complex multi-hop environments. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/blackarrowsec/pivotnacci" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/blackarrowsec/pivot</span><span class="invisible">nacci</span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
ReynardSec<p>„TLDR: Got “OneDrive Admin”-equivalent permissions on a cloud-native estate? You can escalate to a Privileged Entra role by backdooring the administrator’s PowerShell Profile.”</p><p><a href="https://labs.reversec.com/posts/2025/07/high-profile-cloud-privesc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">labs.reversec.com/posts/2025/0</span><span class="invisible">7/high-profile-cloud-privesc</span></a></p><p><a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>azure</span></a> <a href="https://infosec.exchange/tags/entraid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>entraid</span></a> <a href="https://infosec.exchange/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://infosec.exchange/tags/m365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>m365</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/sysops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysops</span></a></p>
DIGITAL PRIVACY<p>Is anyone successfully running <a href="https://fosstodon.org/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GrapheneOS</span></a> (latest version/android 16) and <a href="https://fosstodon.org/tags/frida" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>frida</span></a> (v16.7.19)?</p><p>Currently setting up the Pixel 8a for testing purposes.</p><p>No issues with frida (v16.7.19) on Xiaomi Poco X3 (latest lineageos/android15).</p><p>Found this <a href="https://github.com/frida/frida/issues/2743" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/frida/frida/issues/</span><span class="invisible">2743</span></a> . Doesn't seem to be solved though.</p><p><a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
testssl.sh :verified:<p>testssl.sh 3.3dev got a bit snappier, most notably for Macs:</p><p><a href="https://infosec.exchange/tags/TLS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TLS</span></a> <a href="https://infosec.exchange/tags/SSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSL</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
ReynardSec<p>Check out this new Dirk's article, especially if you use AD, AD CS and Intune: "Extending AD CS attack surface to the cloud with Intune certificates".</p><p><a href="https://dirkjanm.io/extending-ad-cs-attack-surface-intune-certs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dirkjanm.io/extending-ad-cs-at</span><span class="invisible">tack-surface-intune-certs/</span></a></p><p><a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/activedirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activedirectory</span></a> <a href="https://infosec.exchange/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://infosec.exchange/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>azure</span></a> <a href="https://infosec.exchange/tags/m365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>m365</span></a> <a href="https://infosec.exchange/tags/intune" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>intune</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>
DEF CON<p>All signs point to <a href="https://defcon.social/tags/DEFCONTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCONTraining</span></a> Las Vegas 2025…</p><p>Think you have what it takes? If you recognize qrspba, unpxre, or onqtryvsr then follow the trail to Z2VudmF2YXQucXJzcGJhLmJldAo= to learn more. There’s still time to sign up!</p><p><a href="https://defcon.social/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a> <a href="https://defcon.social/tags/defcon33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon33</span></a> <a href="https://defcon.social/tags/cybertraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybertraining</span></a> <a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://defcon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://defcon.social/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a> <a href="https://defcon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://defcon.social/tags/training" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>training</span></a></p>
dan_nanni<p>A reverse shell is a stealthy connection that lets an attacker remotely control a target system by having it initiate the connection, often bypassing firewalls to run commands and exploit weaknesses</p><p>Here is how a reverse shell works 😎👇 <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p><p>Find high-res pdf books with all my <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> related infographics at <a href="https://study-notes.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">study-notes.org</span><span class="invisible"></span></a></p>
danielbrown78<p><a href="https://blackhatus.com/darksky-ddos-loader-bot-cracked-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blackhatus.com/darksky-ddos-lo</span><span class="invisible">ader-bot-cracked-2025/</span></a><br>DarkSky DDoS Loader Bot (DDoS) attacks persist as a significant threat to the cybersecurity landscape, disrupting services, extorting businesses, and resulting in substantial financial losses. Attackers often rely on powerful botnet tools to amplify their attacks, and one such tool, DarkSky DDoS Loader Bot Cracked 2025, has gained notoriety for its effectiveness and accessibility.<br><a href="https://mastodon.social/tags/DarkSkyBotnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkSkyBotnet</span></a>, <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a>, <a href="https://mastodon.social/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a>,</p>
danielbrown78<p><a href="https://blackhatus.com/ez-dork-gen-deluxe-edition-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blackhatus.com/ez-dork-gen-del</span><span class="invisible">uxe-edition-2025/</span></a><br>Ez Dork Gen DELUXE also known as Google hacking, is a widely used technique for uncovering hidden vulnerabilities, exposed databases, and misconfigured web applications. Advanced threat generation tools streamline this process by automating the creation of targeted search queries, allowing both attackers and security professionals to identify exploitable targets quickly.<br><a href="https://mastodon.social/tags/EzDorkGen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EzDorkGen</span></a>,<a href="https://mastodon.social/tags/SecurityTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityTools</span></a>,<a href="https://mastodon.social/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a></p>
Pen Test Partners<p>Most Android apps don’t expose much through services. But system apps? That’s where things get interesting...</p><p>This blog post by David Lodge explains how Android services work and looks into the security risks of AIDL (Android Interface Definition Language) services.</p><p>They’re often used by OEMs to expose system-level functionality, sometimes without proper permission checks. That makes them a worthwhile attack surface if you’re testing vendor builds or reviewing apps with elevated privileges.</p><p>📌Learn more here: <a href="https://www.pentestpartners.com/security-blog/android-services-101/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/android-services-101/</span></a></p><p><a href="https://infosec.exchange/tags/AndroidSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AndroidSecurity</span></a> <a href="https://infosec.exchange/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileSecurity</span></a> <a href="https://infosec.exchange/tags/AIDL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIDL</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
OWASP Foundation<p>🔍 Ready to level up your offensive security skills?</p><p>Join Dawid Czagan on November 3–5 at OWASP Global AppSec USA 2025 for a 100% hands-on training: "Full-Stack Pentesting Laboratory"</p><p>👉 REGISTER: <a href="https://owasp.glueup.com/event/131624/register/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/131624/</span><span class="invisible">register/</span></a></p><p><a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/InfosecTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfosecTraining</span></a> <a href="https://infosec.exchange/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/OWASP2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASP2025</span></a> <a href="https://infosec.exchange/tags/WashingtonDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WashingtonDC</span></a></p>
mkj<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@aria" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>aria</span></a></span> I haven't looked at it in detail but I'm pretty sure you want to check out <a href="https://www.humblebundle.com/books/pentesting-hacking-toolkit-packt-books" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">humblebundle.com/books/pentest</span><span class="invisible">ing-hacking-toolkit-packt-books</span></a></p><p><a href="https://social.mkj.earth/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.mkj.earth/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://social.mkj.earth/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> <a href="https://social.mkj.earth/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlueTeam</span></a></p>
Michael Garweg<p>Learned more about session management and the different attacks that can be performed against insecure implementations.</p><p>Completed the Session Management room on <a href="https://mastodon.online/tags/tryhackme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tryhackme</span></a>.</p><p><a href="https://mastodon.online/tags/sessionmanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sessionmanagement</span></a> <a href="https://mastodon.online/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p><p> </p><p><a href="https://tryhackme.com/room/sessionmanagement?utm_source=linkedin&amp;utm_medium=social&amp;utm_campaign=social_share&amp;utm_content=room" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tryhackme.com/room/sessionmana</span><span class="invisible">gement?utm_source=linkedin&amp;utm_medium=social&amp;utm_campaign=social_share&amp;utm_content=room</span></a></p>
13reak :fedora:<p>Submitted my CARTP exam report. Fingers crossed 🤞 </p><p><a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/exam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exam</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>azure</span></a></p>
Nightfighter 🛡️<p>Hiding in the Shadows: Covert <a href="https://social.tchncs.de/tags/Tunnels" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tunnels</span></a> via <a href="https://social.tchncs.de/tags/QEMU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QEMU</span></a> Virtualization</p><p><a href="https://social.tchncs.de/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://social.tchncs.de/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://social.tchncs.de/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://social.tchncs.de/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://social.tchncs.de/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> </p><p><a href="https://trustedsec.com/blog/hiding-in-the-shadows-covert-tunnels-via-qemu-virtualization" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">trustedsec.com/blog/hiding-in-</span><span class="invisible">the-shadows-covert-tunnels-via-qemu-virtualization</span></a></p>
DEF CON<p>🚨 Swag alert! 🚨 </p><p>Final preparations are underway for <a href="https://defcon.social/tags/DEFCONTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCONTraining</span></a> Las Vegas 2025! Take a look below for a sneak preview of this year’s training swag, provided exclusively to students and instructors.</p><p>It’s not too late to sign up. Browse the course offerings and secure your spot today: <a href="https://training.defcon.org/collections/def-con-training-las-vegas-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">training.defcon.org/collection</span><span class="invisible">s/def-con-training-las-vegas-2025</span></a> </p><p><a href="https://defcon.social/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a> <a href="https://defcon.social/tags/defcon33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon33</span></a> <a href="https://defcon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://defcon.social/tags/cybertraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybertraining</span></a> <a href="https://defcon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://defcon.social/tags/offensivecyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offensivecyber</span></a> <a href="https://defcon.social/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://defcon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://defcon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>