0b1d1 Profile picture
pwn ⚔️ · r3d t34m 🎯 · bug hunt (soon™) 🐞 · Random Red Guy 🔴 · scribbles → https://t.co/FIT9hV6R1A · THM → https://t.co/upMQKI5Bbj
8 subscribers
Nov 27 9 tweets 1 min read
🌐 Understanding Network Layers & Protocols: The OSI Model (Quick Guide) Image 🔌 Layer 1 -Physical

Moves raw bits across physical media.
Protocols: 10BASE-T, DSL, ISDN, USB, RS-232, SONET/SDH
Devices: Cables, hubs, repeaters
Nov 26 26 tweets 17 min read
🧠 BGP Techniques for Network Engineers

1. Introduction to BGP

What is BGP?
Border Gateway Protocol (BGP) is the Internet’s primary path-vector routing protocol, responsible for exchanging routing information between autonomous systems (AS). Image Defined in RFC 4271 and running over TCP port 179, BGP enables policy-driven routing and provides precise control over how traffic moves across multiple ISPs and large networks.

✉️Comment PDF for full guide
Nov 25 30 tweets 21 min read
🛡️ Master Windows Server Hardening with Group Policy Security (GPO)
Want the full breakdown?

✉️Comment “PDF” for the complete guide. Image Windows Server remains the backbone of modern enterprise systems and securing it has never been more critical. One of the most powerful yet overlooked tools for building a hardened Windows environment is the Group Policy Object (GPO).
Nov 25 24 tweets 17 min read
🌐 AWS Interview Preparation – Master the Essentials to Stand Out

Preparing for an AWS interview means having both strong cloud fundamentals and real hands-on experience with core AWS services.

✉️Comment “pdf” for the full guide. Image This streamlined AWS Interview Guide highlights exactly what hiring managers expect from cloud engineers
Nov 23 11 tweets 4 min read
🔥 Web Application Firewalls (WAF): Your First Line of Defense and Sometimes Your First Point of Failure Image I just finished going through a detailed deep-dive on WAFs and it perfectly highlights a truth many teams ignore:
deploying a WAF doesn’t mean your application is secure
Nov 21 7 tweets 3 min read
📘 Master Cisco Commands The Ultimate Cheat Sheet Every Network Engineer Should Have

Whether you’re studying for the CCNA configuring production networks or troubleshooting daily issues having the right Cisco commands at your fingertips can save you hours of work. Image This cheat sheet provides a fast, organized and practical reference to the most essential commands across routing switching VLANs, DHCP, NAT, security, and troubleshooting
Nov 18 13 tweets 4 min read
🔍 Monitoring Software Installation & Uninstallation in Windows with Wazuh

Tracking software changes on Windows endpoints is a crucial part of enterprise security. Image When installations or removals go unnoticed organizations risk exposure to malware persistence, shadow IT activity and the loss of essential security tools
Nov 18 10 tweets 6 min read
⚙️ ISP vs. Enterprise Network Issue Identification Complete Reference Guide

Effective network troubleshooting isn’t about guessing it’s about applying a systematic approach to pinpoint where an issue truly originates.

✉️ Comment PDF for full Guide Image This refined guide, “ISP vs. Enterprise Network Issue Identification,” breaks down a clear and repeatable workflow for determining whether a connectivity problem stems from your internal enterprise network or from your ISP
Nov 18 24 tweets 17 min read
Blue Team Cheatsheet

A streamlined, high-impact reference guide built for cybersecurity professionals, SOC analysts, and incident responders looking to strengthen their defensive operations.

✉️Comment PDF for full Guide Image This cheatsheet highlights the most critical blue team skills from threat detection and incident triage to log analysis, containment methods, and rapid response workflows.
Nov 17 6 tweets 3 min read
📘 Understanding VLANs Your Essential Guide

I recently explored Understanding VLANs : The Complete Guide and it’s an outstanding resource for anyone looking to deepen their knowledge of modern network architecture Image The guide breaks down VLAN fundamentals with clarity covering switching, routing, load balancing, and effective network segmentation. Each concept is explained in a practical, real-world context making it easy to connect the theory to what you’ll encounter in actual environments
Nov 16 16 tweets 11 min read
🤖 Unlock the Power of ChatGPT with These Essential Prompts

In this carousel you’ll find a curated set of practical high-impact prompts to help you get more out of ChatGPT whether you’re writing coding brainstorming learning or automating tasks
(Comments PDF for the full guide) Image 💡 Each prompt is crafted to help you:
•Boost productivity and efficiency
•Spark creative ideas and solutions
•Streamline repetitive work
•Support learning and professional development
Nov 16 4 tweets 1 min read
🚀 Master IPv4 Subnetting Like a Networking Pro! 🚀

Dive into this streamlined guide to IPv4 Subnetting a must-have for anyone in the networking world. The infographic breaks down: Image 🔹 CIDR notation
🔹 Subnet & wildcard masks
🔹 Usable IP ranges
🔹 Private IPv4 addressing
🔹 IPv4 classes (A, B, C)
Nov 15 4 tweets 2 min read
🛡️ 100+ Hands-On Cybersecurity Projects 🚀

Cybersecurity isn’t just about certifications it’s about real-world skills. I’ve curated 100+ projects that let you tackle Red & Blue Team scenarios, incident response, and threat analysis just like in a real SOC. Image
Image
Image
Image
What You’ll Gain:
🔹 Practical Red & Blue Team experience
🔹 Real-world detection, analysis & response skills
🔹 Hands-on use of popular cybersecurity tools
🔹 Portfolio-ready projects for job interviews
Nov 15 11 tweets 5 min read
💡 My Cybersecurity Home Lab Mini SOC Environment

Over the past few months, I built a fully virtualized home lab designed to mimic a real SOC environment combining offensive testing, defensive monitoring, and layered security. Image It gives me hands-on experience in threat hunting, network defense, alert correlation, and overall SOC workflows

🔧 Lab Setup Includes:
•🐉 Kali Linux – Recon & exploitation
•🐧 Ubuntu (Wazuh) – SIEM for monitoring & correlation
•🛡 pfSense – Firewall + segmentation
Nov 15 24 tweets 16 min read
📘 Sharing a Powerful Resource on Windows Deployment Services (WDS)

I’m excited to share a highly valuable document that takes an in-depth look at Windows Deployment Services (WDS).

✉️Comment PDF for full Guide Image Written by a member of the Microsoft Deployment Toolkit (MDT) team this guide is part of Microsoft’s Official Curriculum making it one of the most trusted resources you can learn from.
Nov 14 26 tweets 17 min read
🚀 New Lab Resource: Attacking Active Directory with Linux 🐧🛡️

A fully wrapped up Active Directory Attack Lab using only Linux-based tools (mainly Kali).

💬Comment “PDF” for the complete version Image This setup shows how deep you can go inside a Windows domain without relying on any Windows-native utilities everything is done through Linux and open‑source frameworks.
Nov 13 10 tweets 5 min read
🌐 What is DNS?

DNS (Domain Name System) is basically the 📖 phone book of the internet.
It translates human-friendly domain names (like ) into machine readable IP addresses (like 142.250.190.78) so computers can find each other across the network. google.comImage 🧠 Why Do We Need DNS?
Humans remember names easily not numbers
Instead of typing an IP address every time, you just enter a domain name, and DNS automatically finds the right IP for you. ✨
Nov 12 21 tweets 15 min read
🔒 SOC Analyst (L1–L2) Preparation Guide 📘

💬 Comment “PDF” if you’d like to get the guide!

I’ve just uploaded a comprehensive PDF guide designed for anyone preparing to become a Cybersecurity / SOC Analyst (Level 1–2). Image This guide covers everything you need to build strong fundamentals and get ready for real-world SOC operations:
Nov 11 22 tweets 12 min read
Introduction to Firewall

A firewall is a network security device or software designed to monitor, filter, and control incoming and outgoing network traffic according to predefined security rules.

💡 Comment PDF for full guide Image Its main goal is to create a protective barrier between a trusted internal network and untrusted external networks, such as the internet, safeguarding systems from unauthorized access and cyber threats
Nov 11 30 tweets 22 min read
🔐 Ethical Hacking Uncovered The Complete Beginner-Friendly Guide

Cybersecurity isn’t optional anymore it’s the backbone of digital safety in today’s world.

📩 Comment “PDF” for the full guide. Image 💡 What You’ll Learn:
✅ How cyber attacks actually happen
✅ How ethical hackers defend systems
✅ The real penetration testing workflow
✅ Essential tools inside Kali Linux
✅ Google Dorking & reconnaissance fundamentals
Nov 10 25 tweets 17 min read
🚀 New Release: Personal Git Mastery
📩 Comment “PDF” below to get your copy!

Whether you’re a beginner trying to tame Git or an educator looking for a structured, pedagogy-first resource this book is built for fearless learners Image 📘 From “Hello World” to branching, merging, and rebasing, every chapter is an actionable step.
🎮 Includes a fun mini game “Error Hunter” that gamifies common Git mistakes