PinnedCyber Security Certifications are USELESS if You Don’t Do These Things…Credits to https://pauljerimy.com/security-certification-roadmap/Oct 31, 202313Oct 31, 202313
PinnedOSINT Investigation Techniques for Missing Person Cases (Trace Labs)Hi I am Alexis Lingad: - CRTO, OSWP, eCCPT, PenTest+, eWPT, eCDFP, CEH, CySA+ - Philippine Hacker Games Champion 2015 and 2017 - Former…Feb 23, 20234Feb 23, 20234
PinnedHow We Infiltrated an Office Building Covertly as HackersI once dream of becoming a spy and having a chance to experience doing a real life physical penetration test in a real organization here in…Aug 13, 20242Aug 13, 20242
Day #3: My Physical Hacking Experience in Brian Harris’ Covert Access Specialist TrainingThis is a continuation of my physical hacking experience with Brian Harris’s Covert Access training. If you want to read my previous blogs…Aug 7, 2024Aug 7, 2024
Day #2: My Physical Hacking Experience in Brian Harris’ Covert Access Specialist TrainingThis is a continuation of my physical hacking experience with Brian Harris’s Covert Access training. If you want to read my Day #1…Aug 6, 2024Aug 6, 2024
Day #1: My Physical Hacking Experience in Brian Harris’ Covert Access Specialist TrainingI wrote this review to give more awareness to people who see physical hacking as a mystery since very few detailed reviews are seen online…Aug 5, 2024Aug 5, 2024
Battling the Intimidating Binary Exploitation for BeginnersWhen I started joining hacking competitions a decade ago, binary exploitation category is always have the least number of solved. A lot of…May 18, 2024May 18, 2024
Are You in the Right Cyber Security Team? (Technical Edition)These things I will tell here is based on my experience on managing technical people in my previous cyber security company and by…Apr 29, 20241Apr 29, 20241
Hacking a Magento Web ApplicationA lot of e-commerce website is using Magento so I demonstrate here how I hacked into a web application that used this technology.Jul 22, 20231Jul 22, 20231