Skip to main content

Posts

Dynamic Aplication Security Testing tools , Web Vulnerabilities scanners (OSTE META SCANNER)

Dynamic Aplication Security Testing TOOLS (DAST)  what are they and which are the best ? and most known ones ? and is there free open source tools (yes ofc) and which are the best. Definition : DAST tools are a type of security testing solution used to identify and assess vulnerabilities in web applications during runtime or while the application is in operation. Unlike Static Application Security Testing (SAST) tools that analyze the source code or binary of an application without executing it, DAST tools interact with the running application to discover potential security issues assess the security of an application in real-time by interacting with it during runtime. This can include simulating attacks, injecting malicious inputs, and analyzing the application's responses. operate as a "black box," meaning they do not have access to the internal source code of the application. They focus on evaluating the externally visible behavior of the application. typicall
Recent posts

Cyber Security list of related jobs and my experiences.

  my Cybersecurity Analyst Professional Path :  First of all the realm of cybersecurity is bigger than you ever would imagine, and there is no wrong answers on how to start in this field, it's based on your interest your conditions and your willing to give effort for. and am just sharing my experiences and my choices  Cyber Security related job and posts: Here's a list of cybersecurity-related job roles along with brief descriptions: Penetration Tester (Ethical Hacker): Conducts authorized simulated cyberattacks to identify vulnerabilities in systems, networks, or applications. Advises organizations on security weaknesses and provides recommendations for mitigation. Security Analyst: Monitors security alerts and incidents to identify potential threats and vulnerabilities. Analyzes security data to generate reports and recommends improvements in security protocols. Security Operations Center (SOC) Analyst: Works in a SOC to monitor and respond to security incidents. Analyzes

Operating Systems choices Windows or Linux and why ?

  Operating Systems(OSs):      first let's define what are Operating Systems, An operating system is a fundamental software component that acts as an intermediary between computer hardware and user applications. It manages various resources and provides a user-friendly interface for interacting with the computer. The primary functions of an operating system include process management, memory management, file system management, device management and more advance functionality. there are multiple famous operating system such As Windows, macOS, and Linux, as computer scientist you must know  this names before we decide what operating system you want to chose or if you want to dual-boot your system or use them all let's start with basic definitions and key concepts: list of known operating systems:  Windows:           Developed by Microsoft, Windows is one of the most widely used operating systems for personal computers. It features a graphical user interface (GUI) and support

Computer Science Start Story

Computer Science Love Story This article will delve into the genesis of my passion for computer science and the process I underwent to immerse myself in this captivating and ever-evolving field. Let's embark on this journey: Start of a Journey: Like many children of our generation, my fascination with computer games was inevitable. I was particularly addicted to CS: Global Offensive, an extraordinary game with a community that I loved beyond words. However, as with any addiction, there comes a moment when every kid must wake up to reality and step outside the door (in my case, it was inside a virtual door). After obtaining my baccalaureate, I made a pivotal decision to pursue Computer Science and Mathematics at 8 May 1945 Guelma University. This marked the beginning of a voyage into incredible worlds and fascinating languages. It was during this time that I realized computers have their own language, and we can communicate with them. I found myself conversing with the computer eve

Who is OSTEsayed and purpose of This Blog?

 Introduction to Who I Am : Hello and a warm welcome! My name is Seyyid Taqy Eddine Oudjani. I am Algerian and have dedicated six years to the study of computer science, earning both a bachelor's and master's degree. Additionally, I hold numerous certifications in the fields of cybersecurity and artificial intelligence, with more details on my expertise to be shared in future updates. In brief, I am deeply passionate about computer science and cybersecurity. I derive great satisfaction from solving complex problems, and I have set some significant goals for myself. The primary objective of this blog is to document my journey from ground zero to wherever life takes me. My overarching goal is to establish my own enterprise in the cybersecurity domain. To achieve this, my initial steps involve securing an entry-level SOC analyst position and subsequently advancing to meet the requirements of the Blue Team. Following this, I plan to transition to the Red Team, delving into the intr