#ethicalhacking

Hack smarter, defend stronger. Catch the newest daily videos curated for security pros and learners. 🎯 youtube.com/playlist?list=PLXq
#CyberSecurity #ThreatIntelligence #EthicalHacking #DataSecurity #DarkWeb

Wen Bin :verified:kongwenbin@infosec.exchange
2026-01-27

Just published a new beginner-friendly walkthrough for Hack The Box Starting Point - FAWN (Tier 0).

This machine is an excellent introduction to FTP (File Transfer Protocol) and helps beginners understand:
🔹 How FTP works
🔹 Why FTP is insecure by design
🔹 What are the secure alternatives of FTP
🔹 How attackers enumerate services using Nmap
🔹 How anonymous FTP login works
🔹 What is the man command
🔹 How to retrieve files and capture the flag

Instead of rushing through commands, this walkthrough explains the concepts behind every step, which is something I wish I had when I first started learning ethical hacking.

If you are new to penetration testing or is an aspiring ethical hacker, Hack The Box Starting Point is a fantastic learning platform.

🎥 Watch the FAWN walkthrough here:

youtube.com/watch?v=SLFJOEq5w6Y

📂 Full playlist:

youtube.com/watch?v=OqxPRwP8t_

If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.

Happy learning and keep hacking ethically 🔐

#CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #FTP

New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. 👉 youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing

New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. 👉 youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing

New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. 👉 youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing

Troed Sångbergtroed@swecyb.com
2026-01-25

RE: mastodon.social/@mkesenheimer/

If you're interested in voltage glitching for exploiting purposes I recommend checking out the Pico Glitcher. I've used a previous version of this hw to both bypass readout protection as well as dumping bootloaders on STM MCUs.

#EthicalHacking

Latest cyber & hacking videos compiled for you twice a day. Watch now & stay ahead of threats. 🔒 youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #CloudSecurity #Phishing #EthicalHacking

Markus Kastelitzlegalmemory@legal.social
2026-01-21

#EthicalHacking straffrei stellen – Proaktives Aufdecken von Sicherheitslücken mit dem Ziel der Erhöhung der #Cybersicherheit (655/A(E)) | Parlament #Österreich
parlament.gv.at/gegenstand/XXV

2026-01-21

Tomorrow evening on HonkSec Radio, we have a guest interview with Dr. Patrick Ward, PhD, CISSP.

Dr. Ward is a cybersecurity professor at Chattanooga State Community College with a background in software development, programming, and cybersecurity. He was invited in 2016 to start a cybersecurity programme at Chattanooga State, and has been teaching since then.

During our recorded interview, we talked about his background, resources for those learning ethical hacking, what he teaches, and more.

It's going to be a great HonkSec Radio broadcast! Hope you all can tune in! Thursdayat 16:00 (4 PM) U.S. Eastern Time on The WAWL!

wawl.org/

#Cybersecurity #InformationSecurity #Hacking #EthicalHacking #DEFCON #Chattanooga #Cyberpunk #InfoSec #Education #ChattanoogaState #HackThePlanet

Hack smarter, defend stronger. Catch the newest daily videos curated for security pros and learners. 🎯 youtube.com/playlist?list=PLXq
#CyberSecurity #ThreatIntelligence #EthicalHacking #DataSecurity #DarkWeb

Wen Bin :verified:kongwenbin@infosec.exchange
2026-01-20

For beginners in cybersecurity, the "Starting Point" machines on Hack The Box are an invaluable resource. However, many tutorials simply tell you what to type to get the flag.

In my latest YouTube video, I take a different approach with the Meow machine (Tier-0).

I believe that to become a proficient penetration tester or bug bounty hunter, you need to understand the fundamentals.

🔹 What is the purpose of specific Nmap flags like -sV or -Pn?
🔹 How is a port scan like checking the doors of a house?
🔹 Why is Telnet considered insecure compared to SSH?

I break down these concepts step-by-step, ensuring that you are not just memorising commands, but actually learning the logic behind each step.

Whether you are a student, a career switcher, or just curious about ethical hacking, this walkthrough will give you the solid foundation you need.

This is part of an ongoing beginner-friendly series where I will be covering all of the Hack The Box Starting Point machines, step by step.

🎥 Watch the Meow walkthrough here:

youtube.com/watch?v=OqxPRwP8t_s

If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.

Happy learning and keep hacking ethically 🔐

#CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation
cc: @hackthebox

New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. 👉 youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing

New daily playlist: the latest talks and tutorials in cybersecurity and hacking. Stay sharp, stay safe. 👉 youtube.com/playlist?list=PLXq
#CyberSecurity #InfoSec #EthicalHacking #OnlineSafety #Phishing

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst