Read Time:2 Minute, 1 Second

Knowing what skills the seek provides advanced notice of the targets they have

May Day Plea For hackers by Russia

H45H13 May 09, 2022

🔓 Hackers

 Experience in information security

 Experience in identifying and exploiting Web vulnerabilities

 Experience in identifying and exploiting vulnerabilities on Windows and *nix systems

 Knowledge of post-exploitation, pivoting and pinning techniques on windows and *nix systems

 Strong knowledge of common programs and frameworks for testing (For example: Burp Suite \ Fiddler, ZAP Proxy \ Netsparker, Metasploit, PowerSploit, Nessus \ Nexpouse, BloodHound, Cobalt, impacket, responder, mimikatz, sqlmap, etc.)

 Confident in working with exploits, modifying them and executing them

 Understanding current information security threats, attack vectors and vulnerabilities

 Experience with databases of vulnerabilities;

 Ability to read code in one or more languages: C/C++, Python, Java, JavaScript, PHP;

 Confident linux user

 Knowledge of English

 Welcome:

 Experience in participation in bug bounty programs, CTF, information security competitions

 Confident programming skills in at least one programming language

 Reverse engineering experience

 Proficiency in social engineering

 Virus spread experience

 ⌨️ Programmers

 Proficiency in a programming language (Python, C#, C++, PHP, Perl, JS, Golang)

 Knowledge of Bash/Powershell scripting languages

 Skills in collecting information based on open sources (OSINT), developing tools for collecting, processing and analyzing data

 Working with exploits, their modification and execution

 Working with streams

 Reading someone else’s code

 Knowledge of English

Welcome:

 Experience in creating cryptors, malware (stealers, ransomware)

 Ability to optimize code

 Experience with Linux operating systems and containers

 Experience with relational databases

 Virus spread experience

 Proficiency in social engineering

 🔍Osynters

 Geosynthetic

 Breaking through

 Intelligence service

 Availability of bases ≠ experience

 Creation of reports (understandable and readable, and not just throwing information into the chat)

 Welcome:

 Virus spread experience

 Proficiency in social engineering

Virus analytics-operators\Reverse

 Knowledge of modern threats, methods, tools and techniques for conducting attacks, as well as methods and tools for their detection and response.

 Knowledge of network protocols, architecture of modern operating systems and information security technologies

 Assembly Knowledge

 Basic knowledge of OllyDBG, Hiew, IDA tools;

 Basic knowledge of Windows architecture, PE files;

 Reverse skills x86/x64;  .net

 Experience with malware (Creation, distribution)

 Knowledge of English

 Welcome:

 Proficiency in social engineering

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
%d bloggers like this: