PinnedCyber Security Certifications are USELESS if You Don’t Do These Things…Credits to https://pauljerimy.com/security-certification-roadmap/Oct 31, 202313Oct 31, 202313
PinnedOSINT Investigation Techniques for Missing Person Cases (Trace Labs)Hi I am Alexis Lingad: - CRTO, OSWP, eCCPT, PenTest+, eWPT, eCDFP, CEH, CySA+ - Philippine Hacker Games Champion 2015 and 2017 - Former…Feb 23, 20234Feb 23, 20234
PinnedHow We Infiltrated an Office Building Covertly as HackersI once dream of becoming a spy and having a chance to experience doing a real life physical penetration test in a real organization here in…Aug 132Aug 132
Day #3: My Physical Hacking Experience in Brian Harris’ Covert Access Specialist TrainingThis is a continuation of my physical hacking experience with Brian Harris’s Covert Access training. If you want to read my previous blogs…Aug 7Aug 7
Day #2: My Physical Hacking Experience in Brian Harris’ Covert Access Specialist TrainingThis is a continuation of my physical hacking experience with Brian Harris’s Covert Access training. If you want to read my Day #1…Aug 6Aug 6
Day #1: My Physical Hacking Experience in Brian Harris’ Covert Access Specialist TrainingI wrote this review to give more awareness to people who see physical hacking as a mystery since very few detailed reviews are seen online…Aug 5Aug 5
Battling the Intimidating Binary Exploitation for BeginnersWhen I started joining hacking competitions a decade ago, binary exploitation category is always have the least number of solved. A lot of…May 18May 18
Are You in the Right Cyber Security Team? (Technical Edition)These things I will tell here is based on my experience on managing technical people in my previous cyber security company and by…Apr 291Apr 291
Hacking a Magento Web ApplicationA lot of e-commerce website is using Magento so I demonstrate here how I hacked into a web application that used this technology.Jul 22, 20231Jul 22, 20231