This thread brings together all my #infographics until today (2years of work).
These are all infographics about #infosec 🔐
Feel free to share this tweet if you think it may be useful for your #community 📚
Follow me ➡ @SecurityGuill fore more about #security #hacking #news
How does an #Antivirus works?
Quick presentation of the different #Bluetooth Hacking Techniques
What is a #Botnet & How it works?
What is a #Bug Bounty?
What is a DDoS #attack?
What is DNS Poisoning & how it works?
How End-to-End #Encryption works?
Nine Elements of #Digital Forensic Process
What is a Fork Bomb?
What is a #Honeypot?
What is IDS & IPS?
Some #infosec terms
What is Jackpotting?
What is #Kerberos and how it works?
What is #Kubernets?
What is #LDAP and how it works?
Some basic #Linux commands
What is Metasploit?
What is #MFA?
What is #Mimikatz?
How does Mirai botnet works?
Some useful tools for #MobileApp #security testing
What is a MITM #attack?
2/2
What is #Nmap? Some Nmap options.
The main #programming languages in Infosec and their main uses
What is a #ransomware & how it works?
Some good practices to avoid social #engineering attack
Quick presentation of the major #flaws in an Information System
What is #Signal?
What is Software Reverse Engineering?
Some online tools to #analyze #vulnerabilities and #malware of #websites
Some good tools useful for #OSINT
What is #Tor and how it works?
Some of the most used #vulnerabilities scanners
Some of the mose common #vulnerabilities in #web #application
What is #Wireshark?
What is an #XSS attack?
What is Zed Attack Proxy?
Share this Scrolly Tale with your friends.
A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.