orca@Positive-Space:~$ vboxmanage dhcpserver add --netname Pentestlab --ip 10.10.10.1 --netmask 255.255.255.0 --lowerip 10.10.10.2 --upperip 10.10.10.10 --enable
Saturday, 24 March 2018
Wednesday, 7 March 2018
Monday, 5 March 2018
Thursday, 1 March 2018
To get into web app PT
To get into web app PT
-> start with web application hackers handbook
-> practice with all vulnerable applications (like dvwa, mutillidae etc.)
-> try solving vulnhub vm's, hackthebox challenges
-> play ctf
To get into bug bounties
-> be good at web app PT atleast
-> read hackerone reports (site:hackerone.com reports)
-> follow bug bounty researchers on twitter/slack
-> follow their blogs
-> https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102
-> keep on reading new methods and start trying it out
-> you will end up with many dups/na, overcome that.. put your full dedication (you will achive things soon)
-> dont keep switching targets (focus is important thing)
-> think out ot box
OSCP prep
-> be good at web app PT atleast
-> try solving vulnhub vm's, hackthebox challenges
-> go through materials provided by offsec
-> be familiar with linux and few networking concepts
-> start cracking offsec vm's
-> enumeration is key
-> Acquiring skillset is important
Am posting this, since I acquired most of the knowledge from various infosec communities.
Thanks to the community and friends who have helped me :)
- Pranav Venkat
-> start with web application hackers handbook
-> practice with all vulnerable applications (like dvwa, mutillidae etc.)
-> try solving vulnhub vm's, hackthebox challenges
-> play ctf
To get into bug bounties
-> be good at web app PT atleast
-> read hackerone reports (site:hackerone.com reports)
-> follow bug bounty researchers on twitter/slack
-> follow their blogs
-> https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102
-> keep on reading new methods and start trying it out
-> you will end up with many dups/na, overcome that.. put your full dedication (you will achive things soon)
-> dont keep switching targets (focus is important thing)
-> think out ot box
OSCP prep
-> be good at web app PT atleast
-> try solving vulnhub vm's, hackthebox challenges
-> go through materials provided by offsec
-> be familiar with linux and few networking concepts
-> start cracking offsec vm's
-> enumeration is key
-> Acquiring skillset is important
Am posting this, since I acquired most of the knowledge from various infosec communities.
Thanks to the community and friends who have helped me :)
- Pranav Venkat
Subscribe to:
Posts (Atom)