Introduction:


top tools to used for bug bounty

Top tools used in bug bounty:
1.Nmap
2. the Harvester
3.Malteago
4.Metaspoilt
5.Waaplyzer

1.Nmap:

Nmap (“Network Mapper”) is a free and open source utility for network exploration and security auditing.Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of…


polish your skills in cybersecurity

Introduction :


What is bug bounty hunting?

Who is bug bounty hunters?


future and carrers in cybersecurity

Introduction :

* Cyber Security technologies and processes that protect It assets from cyber attacks.

* Even though men outnumber women in cybersecurity by three to one, more women are joining the field — and they are gunning for leadership positions.

* Cybersecurity focuses on protecting computers, mobile devices, networks, applications, and data from unauthorized access.

* Cyber security has become a major concern over the last few years as hackers have penetrated the IT infrastructure of governments and enterprises with increasing frequency and sophistication

* A policy that emphasizes the awareness of cybersecurity to all employees, including the process instructing how…

DataInfoSec

We Provide a great Cybersecurity solutions and business analytics solutions.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store