Profile

Cover photo
Mourad Ben Lakhoua
Lived in Tunisia
607 followers|49,559 views
AboutPostsPhotosVideos

Stream

Mourad Ben Lakhoua

Shared publicly  - 
 
Embrace the Cloud: Revolutionizing How We Do Business Plenty of modern companies are still using physical servers, but nearly all of them function primarily
1
Add a comment...

Mourad Ben Lakhoua

Shared publicly  - 
 
SMS Password Reset Phishing used to compromise email accounts.Social engineering is a simple and effective way to compromise user credentials.
1
Add a comment...

Mourad Ben Lakhoua

Shared publicly  - 
 
Kaspersky Keygen is used by cyber criminal to promote fake surveys and malicious links, this post describe 2 cases where attacker redirect users
1
Add a comment...

Mourad Ben Lakhoua

Shared publicly  - 
 
Zarp Network Attack tool allows to perform network protocols penetration testing. this include scanning , sniffing and DoS remote assets.
3
1
Jason Rooks's profile photo
Add a comment...

Mourad Ben Lakhoua

Shared publicly  - 
 
This week I have been honored to be a guest on one of the popular Tech program in Tunisia. The program covers Cloud Computing Security and new technologies.
1
Add a comment...
In his circles
740 people
Have him in circles
607 people
James Schiwal's profile photo
Mark Puckett's profile photo
mohamed ibnu's profile photo
James McGovern's profile photo
Maxim Tyukov's profile photo
hafidh faleh's profile photo
Elizabeth Schweinsberg's profile photo
Mosudi Isiaka's profile photo
Joseph Shaw's profile photo

Mourad Ben Lakhoua

Shared publicly  - 
 
J2EEScan is a plugin that you can add on Burp Suite security scanning tool. The goal of this plugin is to improve the test coverage during web applications.
1
1
Noah Axon's profile photo
Add a comment...

Mourad Ben Lakhoua

Shared publicly  - 
 
rop-tool is a set of tools that you can use to search gadgets, Patch binaries , Print info about binary, Display heap structure and Disassemble the binary.
1
Add a comment...

Mourad Ben Lakhoua

Shared publicly  - 
 
The breaches arise from computer viruses, malware, criminal insiders and other causes. This article provide How Law Enforcement Agencies Protect Consumers
1
Add a comment...
People
In his circles
740 people
Have him in circles
607 people
James Schiwal's profile photo
Mark Puckett's profile photo
mohamed ibnu's profile photo
James McGovern's profile photo
Maxim Tyukov's profile photo
hafidh faleh's profile photo
Elizabeth Schweinsberg's profile photo
Mosudi Isiaka's profile photo
Joseph Shaw's profile photo
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Previously
Tunisia - Barcelona - Saints petersbourg - Kuwait - Addis abbaba - Dubai
Links
Other profiles
Contributor to
Story
Introduction
Comprehensive project management experience in the design, coding, testing, implementation and support of application computer systems.
Basic Information
Gender
Male