Offensive Security Tools and Techniques

Explore top LinkedIn content from expert professionals.

  • View profile for Nathaniel Shere
    Nathaniel Shere Nathaniel Shere is an Influencer

    Delivering hands-on learning in the most secure way | Penetration Testing | Product Security Engineer at Skillable, where people learn by doing

    21,266 followers

    Penetration Testing Tip of the Week! Open Source Intelligence (OSINT) is an extremely valuable tool of pentests, but it is still just a tool - and, like any tool, it can be abused for evil. Take the example I saw last week of a man (who shall remain nameless to protect the guilty) who did OSINT against a CISO at a major car company. On the one hand, he did a decent OSINT job. He researched her, found her LinkedIn profile and did some analysis. At this point, though, he decided to publicly shame this CISO and her apparent lack of cybersecurity experience. The tool of OSINT abused for evil purposes (public shaming). When you are performing a pentest, you are trying to use these hacker tools and techniques for good - not evil. So, what sort of data or information are we trying to get from OSINT? 🔸 Additional domains/subdomains that the target company owns 🔸 Additional external hosts or subnets that the target company owns 🔸 Potential technology in use and version numbers (if able) 🔸 Types of external facing services and version numbers (if able) 🔸 List of existing employees, including titles, contact information, and physical locations 🔸 Email format of the target company (to extrapolate any employee contact information if an email wasn't found) 🔸 Previous passwords or breach data 🔸 Hobbies, backgrounds, and potential security question answers for employees 🔸 Passwords, secret keys, or API keys exposed by the company inadvertently All of this information is handled securely and privately to test the security of the company -- never to publicly shame an employee, particularly when you don't even work with the relevant employee and know their personal story. That way, we use tools for ethical purposes - and not for evil. #security #cybersecurity #penetrationtesting #pentests #osint #reconnaissance

  • View profile for Erkan Bayar

    Certified Ethical Hacker | Certified Threat Intelligence Analyst | CompTIA Security Analytics Professional | District IT Coordinator | Instructor | Helping people in their professional growth

    7,378 followers

    🚨 𝗣𝗲𝗻𝘁𝗲𝘀𝘁𝗲𝗿𝘀, 𝗔𝘀𝘀𝗲𝗺𝗯𝗹𝗲! 💻🔍 Ready to level up your Kali Linux game? I just dropped a power-packed report featuring the Top 20 Terminal Commands every pentester needs—real-world scenarios, step-by-step usage, and pro tips included. 🧠⚙️ Whether you're hunting for privilege escalation paths 🛠️, cracking hashes 🧩, or owning vulnerable web apps 🌐—this guide is built for intermediate and upper-intermediate trainees. 🔗 Get the full report & sharpen your toolkit. Let’s train like real red teamers. 🕵️♂️🔥 🛡️ Reminder: Always use the tools ethically—with permission, within scope, and for the right purpose. Real skills, real responsibility. 👊💼 Join InfoSecLabs Discord : https://lnkd.in/d6Yz3jA3 InfoSecLabs Website : https://infoseclabs.io/ #Cybersecurity #KaliLinux #Pentesting #EthicalHacking #OffensiveSecurity #CTF #RedTeam #CyberTraining #InfoSec

  • View profile for Kyser Clark

    Cybersecurity Professional | Penetration Tester | Content Creator | OSCP | OSWA | CISSP | United States Air Force Veteran | KyserClark.com

    41,237 followers

    🔥 New Podcast Episode Just Dropped Offensive Security for Blue Teamers: Why Red Team Knowledge Changes Everything What happens when a blue teamer masters offensive tactics? You get faster triage, smarter detections, and sometimes you even beat the forensics team to the punch. In this episode of The Hacker’s Cache, returning guest Joshua Ragland shares how learning C, assembly, and building his own cracking rig gave him a unique edge as a defender. We dig into: Real-world detection and evasion strategies How to simulate attacks without a red team Why AI might actually hurt cybersecurity if we're not careful And some wild stories from the old OSCP labs If you’re in blue team, red team, or just trying to level up in cybersecurity, this one’s worth a watch. 📺Watch now: https://lnkd.in/gyArBp7A 👇 Let me know your biggest takeaway or your own hot take in the comments. #cybersecurity #blueteam #redteam #offensivesecurity #ethicalhacking #pentesting #SOCanalyst #threathunting #TheHackersCache

    Offensive Security for Blue Teamers: Why Red Team Knowledge Changes Everything #54

    https://www.youtube.com/

Explore categories