To grow a Plant , you need r00t
i LOVE to play with different Web technologies like NodeJS , Django and Flask to create a interactive and dynamic Web experiences.
I am a Cyber security Enthusiast, and security researcher , who loves meddling with technology.
I absolutely love eating new kinds of food and expanding the horizons of my taste buds.
I Create Hacking and cyber security challenges for this absolutely awesome community!
I grow with my peers and teammates as i move deeper into this fascinating industry.
I am also a freelancer for cyber secrity , feel free to contact me for all your security and privacy needs!
I take my user/viewers privacy seriously , no data about our user/guest/client is collected.
I love creating education content in the field of cyber security to help everyone have a holistic education.
I love building networks and working togther in teams!
I need someone's help to guide me with CTFs! 😇
If you are just getting started into bug bounties and can't find enough resources, this thread might help you to find a way 👇
@Bugcrowd Does this means my IP is banned ?
P.S: I was testing.
Me in 1995: I can't afford college. I WANT to know what you know, I want to learn and you're going to teach me or I will hack every last computer in this place until you do.
Him: You told me to kiss off two weeks ago. What changed?
Me: I can't buy what you know.
You can use nmap with NSE msrpc-enum script to locate servers and desktops that have remotely exposed "spoolss" and related services (rpc) for exploitation:
nmap -sT -p 135,445,137 -vv --script=msrpc-enum 0.0.0.0/0 --script-args 'smbusername=user,smbpass=pass' -oN nmap.txt
I typically reply to all email inquiries within 24 hours.