Mustapha Mhidi on LinkedIn: Finding Sensitive Data Leaks with LeakIX: A Step-by-Step Approach (2024)

Mustapha Mhidi

Chef de projet Cybersécurité

  • Report this post

💡💡💡

Finding Sensitive Data Leaks with LeakIX: A Step-by-Step Approach https://breachwatchers.com

2

1 Comment

Like Comment

To view or add a comment, sign in

More Relevant Posts

  • Mustapha Mhidi

    Chef de projet Cybersécurité

    • Report this post

    MyMSIAnalyzer is a tool that allows you to detect vulnerabilities inside MSI files. It is able to:Check for credential leaksDetect vulnerable Custom ActionsCheck MSI files signature (useful for MST Backdoor)Check if Custom Actions can be overwrittenIn addition, there is a GuiFinder project in the repository. It can be used to detect MSI files that have a graphical interface and run on behalf of the NT AUTHORITY\SYSTEM, allowing you to elevate your privileges via explorer.exe escapeThe tool is easy to use:.\MyMSIAnalyzer.exe [-path <PATH TO MSI Files. Default value: C:\Windows\Installer>].\GuiFinder.exe [--folder <PATH>]If you're not familiar with this method of privilege escalation, I encourage you to read our article.https://lnkd.in/ekqDNnNM

    • Mustapha Mhidi on LinkedIn: Finding Sensitive Data Leaks with LeakIX: A Step-by-Step Approach (5)

    6

    1 Comment

    Like Comment

    To view or add a comment, sign in

  • Mustapha Mhidi

    Chef de projet Cybersécurité

    The hardware crypto wallet manufacturer Ledger suffered a data breach that exposed over 1 million email addresses. The data includes names, physical addresses and phone numbers. Compromised accounts: 1,075,241Compromised data: Email addresses, Names, Phone numbers, Physical addresses🥲🥲🥲

    1

    Like Comment

    To view or add a comment, sign in

  • Mustapha Mhidi

    Chef de projet Cybersécurité

    • Report this post

    Dork KingEnter your target domain and get quick links to find pages with SQL Errors, backup files, backdoors, open redirects, log files and more.https://lnkd.in/eYd_pKtGCreator twitter.com/dirtycoder0124

    Dork King dorkking.blindf.com

    1

    Like Comment

    To view or add a comment, sign in

  • Mustapha Mhidi

    Chef de projet Cybersécurité

    • Report this post

    Pentest GPTAI assistant that can run different#pentest tools. Available for free:- CVEMap- Subdomain Finder- Link Finder- WAF Detector- Whois Lookup Nuclei, SQLi Exploiter, Katana, and Linux terminal commands are available in the PRO version.pentestgpt.ai

    1 Comment

    Like Comment

    To view or add a comment, sign in

  • Mustapha Mhidi

    Chef de projet Cybersécurité

    • Report this post

    Une liste organisée d'outils et de ressources d'intelligence open source incroyablement impressionnants. Le renseignement open source (OSINT) est un renseignement collecté à partir de sources accessibles au public. Dans la communauté du renseignement (IC), le terme "ouvert" fait référence à des sources ouvertes et accessibles au public (par opposition à des sources secrètes ou clandestines).Cette liste est pour aider tous ceux qui sont dans l'intelligence des menaces cybernétiques (CTI), la chasse aux menaces ou l'OSINT. Des débutants aux avancés.Joyeux piratage et chasse 🧙♂️https://lnkd.in/eisdn3aN

    GitHub - jivoi/awesome-osint: :scream: A curated list of amazingly awesome OSINT github.com

    5

    1 Comment

    Like Comment

    To view or add a comment, sign in

  • Mustapha Mhidi

    Chef de projet Cybersécurité

    • Report this post

    ESP8266-powered Netgotchi network security scanner aims to protect your home network.The Netgotchi network security scanner is a simple, compact device based on an ESP8266 wireless microcontroller with a single goal: to defend your home network from intruders and potential bad actors. It is described as “Pwnagotchi’s older brother,” a network guardian that keeps your network safe instead of penetrating it.The Netgotchi software is open-source and available in ESP32 and ESP8266 versions in the GitHub repository, alongside an installation guide. The device has been tested and is compatible with Minigotchi firmware. Minigotchi is a currently archived project that is essentially a tiny Pwnagotchi, and performs deauth attacks and advertisem*nts.https://lnkd.in/efiNMBQZhttps://a.co/d/bW7AG5O$79.00

    • Mustapha Mhidi on LinkedIn: Finding Sensitive Data Leaks with LeakIX: A Step-by-Step Approach (20)

    6

    Like Comment

    To view or add a comment, sign in

  • Mustapha Mhidi

    Chef de projet Cybersécurité

    • Report this post

    🎁🎁🎁

    10 Essential OSINT CTF Challenges for Every Investigator medium.com

    2

    Like Comment

    To view or add a comment, sign in

  • Mustapha Mhidi

    Chef de projet Cybersécurité

    • Report this post

    ☀️☀️☀️☀️☀️windows-api-function-cheatsheetsPublicforked from PaddyCahil/windows-api-function-cheatsheetsA reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.https://lnkd.in/eSxajKPp

    GitHub - 7etsuo/windows-api-function-cheatsheets: A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations. github.com

    2

    Like Comment

    To view or add a comment, sign in

  • Mustapha Mhidi

    Chef de projet Cybersécurité

    • Report this post

    Found an interesting project called 👀 "Surveillance Watch".⬇️ https://lnkd.in/e255JG7QThe site features an interactive 🗺map created by privacy activists, most of whom have personally suffered from surveillance technologies. The goal of the project is to uncover hidden connections between companies, organizations, and technologies that are closely connected to the surveillance and espionage industry, benefiting from collecting user data. For example, Candiru, Clearview AI, DarkMatter, NSO Group, mSPY, Palantir, and so on.https://lnkd.in/e255JG7Q

    3

    Like Comment

    To view or add a comment, sign in

Mustapha Mhidi on LinkedIn: Finding Sensitive Data Leaks with LeakIX: A Step-by-Step Approach (30)

Mustapha Mhidi on LinkedIn: Finding Sensitive Data Leaks with LeakIX: A Step-by-Step Approach (31)

1,036 followers

  • 425 Posts
  • 1 Article

View Profile

Follow

More from this author

  • 🚀 Le défi Red Team vs Blue Team ! 🚀 Mustapha Mhidi 1mo

Explore topics

  • Sales
  • Marketing
  • IT Services
  • Business Administration
  • HR Management
  • Engineering
  • Soft Skills
  • See All
Mustapha Mhidi on LinkedIn: Finding Sensitive Data Leaks with LeakIX: A Step-by-Step Approach (2024)

References

Top Articles
Latest Posts
Article information

Author: Velia Krajcik

Last Updated:

Views: 6089

Rating: 4.3 / 5 (54 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Velia Krajcik

Birthday: 1996-07-27

Address: 520 Balistreri Mount, South Armand, OR 60528

Phone: +466880739437

Job: Future Retail Associate

Hobby: Polo, Scouting, Worldbuilding, Cosplaying, Photography, Rowing, Nordic skating

Introduction: My name is Velia Krajcik, I am a handsome, clean, lucky, gleaming, magnificent, proud, glorious person who loves writing and wants to share my knowledge and understanding with you.