<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2595502479307004038</atom:id><lastBuildDate>Wed, 11 Feb 2026 08:14:19 +0000</lastBuildDate><category>advisories</category><category>tools</category><category>trainings</category><category>papers</category><category>talent-highlights</category><category>updates</category><category>interviews</category><category>misc</category><category>security</category><category>presentations</category><category>exploits</category><title>YGN Ethical Hacker Group Blog</title><description>Updates about YGN Ethical Hacker Group&#39;s Activities</description><link>http://bl0g.yehg.net/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>255</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-2363257017956732230</guid><pubDate>Sun, 02 Apr 2023 13:16:00 +0000</pubDate><atom:updated>2023-04-02T06:16:57.368-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">interviews</category><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with Cyber Security Talent: Thu Ya</title><atom:summary type="text">1.	ညီရဲ့ အကြောင်းလေး ပြောပါဦး။ကျွန်တော်သူရပါ။ ကျွန်တော် Cybersecurity ပိုင်းကို ၂၀၁၀ လောက်တုန်းက စဝင်ခဲ့ပါတယ်။ 2010 လောက်တုန်းက Network Security နဲ့ Microsoft AD Security ပိုင်းကို အဓိကထားလုပ်ခဲ့ပါတယ်။ 2015 မှာ မြန်မာကနေ ပထမဆုံး နိုင်ငံတော်က စီစဉ်ပေးတဲ့ CTF ကို Indonesia မှာသွားပြိုင်ခဲ့ပါတယ်။ ကျွန်တော် Telecom လောကမှာ Security ပိုင်းနဲ့ ၅ နှစ်လောက်လုပ်ခဲ့ပါတယ်။ Company အမျိုးမျိုးမှာ Position </atom:summary><link>http://bl0g.yehg.net/2023/04/interview-with-cyber-security-talent.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnXltfhqQfMunbeQMMCkAeEfY0RSL4k87ULe1Zy91QLi3kBDJncK4vp7A8Zk6O2dIE_EvwPkWROP-NM28eIItwPTbeZspGJT8PS1DDKqsz9bSw2yvF_ChT4p37-x5Ffv5zt9I4CbXZIRaJcUhpYnDjjnu-cPuNg0Lt3zQBL31Q9w095LYnG7l4soY_tQ/s72-c/WhatsApp%20Image%202023-04-02%20at%206.55.18%20PM.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-1762828046398900152</guid><pubDate>Wed, 15 Sep 2021 14:09:00 +0000</pubDate><atom:updated>2021-09-15T07:09:51.617-07:00</atom:updated><title>OSEP course and exam review</title><atom:summary type="text">&amp;nbsp;IntroductionHello guys, I would like to write a review about OSEP course and exam that I purchased in July 2021. During that time, my mind was feeling unwell and so I decided to take a course from Offsensive Security after I passed OSWE exam.&amp;nbsp;Course and lab reviewI subscribed OSEP for 3 months lab access because I am not very familiar with the course contents. You can download course </atom:summary><link>http://bl0g.yehg.net/2021/09/osep-course-and-exam-review.html</link><author>noreply@blogger.com (kmt)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9M_s3IXz0nis3btC5TElFbp2-YB3pRsRA7Dx5KcmFZmWYVX9HzITS511MQ3TYCjvNnYDhIGO1C2KyXwuMIYMvDESduMounzrVFNNezjHBGnZ-UdM9PjNQjkzM2DlVQ2edrv9NYu19ziQ/s72-w640-h375-c/image.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-3063945199872603239</guid><pubDate>Wed, 19 May 2021 17:40:00 +0000</pubDate><atom:updated>2021-05-20T09:42:51.554-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with Cyber Security Talent: Min Ko Ko</title><atom:summary type="text">&amp;nbsp;&amp;nbsp;1. ညီရဲ့ အကြောင်းလေး ပြောပါဦး။ကျွန်တော်နာမည်အရင်းက မင်းကိုကိုပါ။ ဒီ Computer နယ်ပယ်ထဲစဝင်တုန်းက cyberoot ဆိုတဲ့ nickname ကြောင့်အများကတော့ KoRoot လို့ခေါ်ကြပါတယ်။ Computer ကျောင်းပြီးပြီး ၂ နှစ်ကျော်မှ Computer နယ်ပယ်ထဲသေချာဝင်ဖြစ်ပါတယ်။ မှတ်မှတ်ရရတော့ အသက် ၂၅ (2012)ကစပြီး web developing စပြီးလေ့လာဖြစ်တယ် အဲလိုကနေပဲ security အပိုင်းဆက်ပြီးလေ့လာဖြစ်ပါတယ်။ 2019 လောက်ကစပြီး web </atom:summary><link>http://bl0g.yehg.net/2021/05/interview-with-cyber-security-talent.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMIbg-HfCDY7tGWfhArtgDCvqYrYpWBHc0o-Dqwr-cl9TwgFDQ3rwASTtniyyHmWUyZCrhwlafETb5xI1Ef8KxZwGujmTIFaF2MetS00J1lPd4Iwv-PMS6JAbTXmMAWpoOqBV5PW2aWIZu/s72-w640-h480-c/profile.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-3920850874848152248</guid><pubDate>Mon, 21 Dec 2020 12:48:00 +0000</pubDate><atom:updated>2020-12-21T04:48:37.473-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with Cyber Security Talent: Hein Thant Zin</title><atom:summary type="text">The year of 2020 has proven the booming of Cybersecurity/
 Ethical Hacking/ Bounty Hunting young
 talents in Myanmar.&amp;nbsp; YEHG is wholeheartedly proud to 
feature an awesome young cybersecurity talent, Hein Thant Zin.______________________________&amp;nbsp;&amp;gt; A little bit about yourselfJust another guy who’d love to find some random loopholes in Web Application and REST API. &amp;gt; What made you </atom:summary><link>http://bl0g.yehg.net/2020/12/interview-with-cyber-security-talent_21.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3Ee17CtHWtyfqtOjeiVoZ9vd1hFBqMKd38zeppYrmA4MRG36DSNz1-N3IE-SyRj6GXWx4OSEkNg7_CFB7nDEX4fICqswpboFKrL7TWJEQ5mzixztG7R2Mat3dx52U_-FmDAok5BDYQGp8/s72-w574-h640-c/Hein.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-1581140271530427126</guid><pubDate>Mon, 21 Dec 2020 05:02:00 +0000</pubDate><atom:updated>2020-12-20T21:02:52.034-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with Cyber Security Talent: Chan Nyein Wai</title><atom:summary type="text">Cybersecurity/
 Ethical Hacking/ Bounty Hunting have been capturing the hearts of young
 talents in Myanmar.&amp;nbsp; YEHG is wholeheartedly proud to 
feature a&amp;nbsp; cybersecurity talent, Chan Nyein Wai.______________________________&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;1. A little bit about yourselfI am the one who interested about cyber security and technology.I like helping people , company and want&amp;nbsp; to </atom:summary><link>http://bl0g.yehg.net/2020/12/interview-with-cyber-security-talent_8.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEiLE4Mp0DEnJP900FJ16CoutOcNA21CNduQOW6EERKOAMNW6GDRLvvht4RCN1pPFNkiaIRtJuyHZ-ooAbpZirkOcMar9vp6mOz0cj3MrE2rNxLyei5fR1w8dl_XcJ5LaNLu6awAuRFZni/s72-w640-h640-c/chan.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-2274173713384357935</guid><pubDate>Mon, 21 Dec 2020 02:02:00 +0000</pubDate><atom:updated>2020-12-20T18:03:23.106-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with Cyber Security Talent: Nay Myat Min</title><atom:summary type="text">&amp;nbsp;Cybersecurity/
 Ethical Hacking/ Bounty Hunting have been capturing the hearts of young
 talents in Myanmar.&amp;nbsp; Today, YEHG is wholeheartedly proud to 
feature a&amp;nbsp; cybersecurity talent, Nay Myat Min.______________________________&amp;nbsp;1. A little bit about yourselfI am Nay Myat Min, a master’s student of Cyber Security at Mahidol University. I am currently working as an assistant </atom:summary><link>http://bl0g.yehg.net/2020/12/interview-with-cyber-security-talent_89.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimqkgQD0QDg1-Ac58IheXTg021D7kpoyfoU9YlhtZjIkWH2ncNLt2iFx_KxRwbKUCcWJ17Ug8hIJ3z6pngBubRLuXAC6xInuGbaAzC82R1-QEXD6itmBAWUQ29NaPGwVgSZ6e5zOw-gJb2/s72-w512-h640-c/naymyatmin.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-5109365952705502903</guid><pubDate>Sun, 20 Dec 2020 15:19:00 +0000</pubDate><atom:updated>2020-12-20T18:11:09.685-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with Cyber Security Talent: Nay Min Htet</title><atom:summary type="text">Cybersecurity/
 Ethical Hacking/ Bounty Hunting have been capturing the hearts of young
 talents in Myanmar.&amp;nbsp; Today, YEHG is wholeheartedly proud to 
feature a&amp;nbsp; cybersecurity talent, Nay Min Htet. ______________________________&amp;nbsp;1. A little bit about yourselfMy name is Nay Min Htet, and I am working as a Cyber Security Specialist. I love exploring systems to gain a better </atom:summary><link>http://bl0g.yehg.net/2020/12/interview-with-cyber-security-talent_20.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKLMiv2l_0Yis36yB3gvDMTmGpXWOG1acAT7KGwj5WRTX47oz149zgIuM-wj_kcX-TRJ-fs3NUHe25EQJX5vE-0ThbmbQHBesLVuth9KczVzHxgBIIcTJmvZk0TlXYtMGMjFylCfjT30LI/s72-w640-h480-c/n1608215548094.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-8715259861525562285</guid><pubDate>Thu, 17 Dec 2020 15:03:00 +0000</pubDate><atom:updated>2020-12-20T18:04:09.518-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with Cyber Security Talent: Kaung Myat Min</title><atom:summary type="text">Cybersecurity/
 Ethical Hacking/ Bounty Hunting have been capturing the hearts of young
 talents in Myanmar.&amp;nbsp; This time, YEHG is wholeheartedly proud to 
feature a youngest known-to-date 17-year old cybersecurity talent, Kaung Myat Min.&amp;nbsp;______________________________&amp;nbsp;&amp;nbsp;&amp;nbsp;1. A little bit about yourself.&amp;nbsp;I am just somebody who enjoys developing things and then breaking </atom:summary><link>http://bl0g.yehg.net/2020/12/interview-with-cyber-security-talent_17.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0V-nSnOFFquMytEDBa4GsPBSVNPTKstvDIXhSBA89XpSdHf9PUjwLyP8lwxFOR5HbISJexp-rfBWkomk-xr_4s-2dP4ugaII080IidgAP-6jZ1rHrEInbx8UCJnAp_xQEsfoGJLw6o96U/s72-w442-h640-c/1608166955206.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-3713506370002251300</guid><pubDate>Sun, 13 Dec 2020 07:04:00 +0000</pubDate><atom:updated>2020-12-20T18:04:19.807-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with Cyber Security Talent: Hein Htet Aung</title><atom:summary type="text">&amp;nbsp;&amp;nbsp;Cybersecurity/ Ethical Hacking/ Bounty Hunting have been capturing the hearts of young talents in Myanmar.&amp;nbsp; This month, YEHG is wholeheartedly proud to feature a young cybersecurity talent, Hein Htet Aung. _______________________________________&amp;nbsp;&amp;nbsp;1) A little bit about yourselfI&#39;m Hein Htet Aung, 22 years old and currently working as Associate Security Specialist in Yoma</atom:summary><link>http://bl0g.yehg.net/2020/12/interview-with-cyber-security-talent.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNa7aCCJdhmDab4OyFUEbaoEhWbdjoYWg21VsfQPTZtXQ6zIj-JBptnwDkP5tCEbhzaB4uT7an0i01inLFbu-mlGctX75BUV0JxszpR2aVsx8P3bPN3RB8sPYrqcv8PAw0hrRUnpQx-Rjf/s72-w480-h640-c/1607668974013.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-5224542910415351523</guid><pubDate>Sat, 16 May 2020 10:45:00 +0000</pubDate><atom:updated>2020-12-20T18:04:30.715-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">interviews</category><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with Cybersecurity Talent: Kaung Htet Aung</title><atom:summary type="text">



















1) A little bit about yourself

I am Kaung Htet Aung. I explore weirdness in systems to surface security bugs for living. 

2) What made you become obsessed with Cyber Security?

I regard hacking as an art and this is generally how it&#39;s portrayed by many others as well if you reminisce about the past. As such my curiosity has always been onto exploring the process to be well </atom:summary><link>http://bl0g.yehg.net/2020/05/interview-with-cybersecurity-talent_16.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqortfa86OdafhtHoKFHxzUDZ-FBuEaqUwr91JJJOafdLw8a5q810C6w5NDbdZBDqDgd-W6yMNzT930akx7y24fI4Tilb8tIwU6k9QLnNEqa1PA-tbmf2dQObT_jWMhHPIwcCGMsmrVrko/s72-c/kh0.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-6084837183421894537</guid><pubDate>Sun, 10 May 2020 15:31:00 +0000</pubDate><atom:updated>2020-05-10T08:31:55.382-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">interviews</category><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with Cybersecurity Talent: Steve Nyan Lin</title><atom:summary type="text">




1) A bit about yourself

I am Steve Nyan Lin, currently working as a Security Consultant in Singapore, and have been staying here since my secondary schooling days. When I am not working, I like to play chess, watch football and listen to music. I currently hold a Bachelor in Engineering (Electrical and Electronic Engineering) from Nanyang Technological University.2) What made you obsessed </atom:summary><link>http://bl0g.yehg.net/2020/05/interview-with-cybersecurity-talent_10.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6qswJ6cnuRoXFXHc6fpd1dbuBe88AFK7_kr6RzlQlgCUIm-vr0SeBJqpNH4pZhTxNuXYAEnztR53-q3yK1iSurISFGkyA5rtCj_kq3B5iUlO-j_HDgRun3_ucrWERTh3pu06DeZU3fDtN/s72-c/Steve.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-6104815129179578278</guid><pubDate>Sat, 09 May 2020 05:15:00 +0000</pubDate><atom:updated>2020-05-08T22:15:45.873-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">interviews</category><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with CyberSecurity Talent: Aung Kyaw Phyo</title><atom:summary type="text">


&amp;nbsp;


1) A little bit about yourself


I am Aung Kyaw Phyo, graduated from University of Computer Studies, Yangon(UCSY). Currently, I am working as an Assoc Cyber Security Analyst in Kernellix.&amp;nbsp;



2) What made you become obsessed with Cyber Security?



I am interested in finding out the ways how can I intrude and bypass targets, learning how other guys find and exploit </atom:summary><link>http://bl0g.yehg.net/2020/05/interview-with-cybersecurity-talent_8.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAcT2PPJ0hSxd_AvgSmfmv5yYioEXc2xyXPLXzOsd1i-Q4SHNSPEYXPFBCUtfFEBj7ZaofHRKoaPUpmvsJzsaEUjmDcehKkMP2uBY0iVJsNXAvMWdVeNPTPDSMl_M1Ryt84_mlXD-foP7P/s72-c/akp.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-8764289526180787026</guid><pubDate>Sun, 03 May 2020 11:32:00 +0000</pubDate><atom:updated>2020-05-10T08:32:18.872-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">interviews</category><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with CyberSecurity Talent: Ethan</title><atom:summary type="text">




1) A bit about yourself
Everyone call me Ethan. I am just one of the Cyber Security Enthusiastics like others. 


2) What made you become obsessed with CyberSecurity?

I have been interesting in Cyber Security (Defensive) since I was young. I only interested how to secure my systems and network even when everyone was talking about the programming. My interest was getting stronger when I </atom:summary><link>http://bl0g.yehg.net/2020/05/interview-with-cybersecurity-talent.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6OqSZZUabVktRy_KJogn4DrjSK54Ep4Y1KIq-IGK6oQerPQEbP-LMJ2wdiLgfUrq81BpXet8LBe0iP2kruGtF7EfUiag9Zd6DGSKWCKxdg0aqcGD_CnMDAYzHn_sEe38KF9cTcYcVZvcF/s72-c/e.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-1610620465460701333</guid><pubDate>Sun, 03 May 2020 04:14:00 +0000</pubDate><atom:updated>2020-05-02T23:56:01.449-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">interviews</category><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Story of a Penetration Tester, Ko Sai Tin Htun Naing</title><atom:summary type="text">
This time, we reached out to Ko Sai Tin Htun Naing for sharing how he managed to get on to his long-desired security career.

-------




My name is Sai Tin Htun Naing and formerly known as Infofreakz by the handle. I started my IT career in 2002 as a Web Designer. I then worked as a&amp;nbsp; Web Developer and&amp;nbsp; System Administrator. Currently, I’m working as a Penetration Tester.

Over a </atom:summary><link>http://bl0g.yehg.net/2020/05/story-of-penetration-tester-ko-sai-tin.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjU27IIdGTbsvrG6WNsWm0WNb7vzuYV4DkSQQYYL5G928dEGNdPANPRJ1OTCp3zX3wQ26ghzNHKoCsZff7UKhLFxfnoxLtrUfkjjBi_ysMP-SYUt_wBRJicD1wvEBQEcLvQRAIzccLU-YdT/s72-c/kosai.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-5233858861147425285</guid><pubDate>Mon, 20 Apr 2020 13:32:00 +0000</pubDate><atom:updated>2020-12-20T07:45:49.523-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">interviews</category><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with Ye Yint Min Thu Htut (Offensive Security Engineer)</title><atom:summary type="text">

Cybersecurity Career Pathway: https://www.facebook.com/365902044065917/posts/515004779155642/?d=n&amp;nbsp;&amp;nbsp;Pentester Career Path: https://www.facebook.com/watch/live/?v=1157846244630106&amp;amp;ref=watch_permalink&amp;nbsp;

We&#39;re confident that this session will ignite the interests of many talents and emergence of next-generation Cyber Security professionals in Myanmar.&amp;nbsp; 



</atom:summary><link>http://bl0g.yehg.net/2020/04/interview-with-ye-yint-min-thu-htut.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-8170535845342017922</guid><pubDate>Mon, 12 Aug 2019 07:26:00 +0000</pubDate><atom:updated>2021-02-10T21:51:48.172-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">interviews</category><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with CyberSecurity Talent: Kyaw Min Thein</title><atom:summary type="text">
Cybersecurity/ Ethical Hacking/ Bounty Hunting have captured the hearts of young talents in Myanmar.&amp;nbsp; This month, YEHG is wholeheartedly proud to feature a young cybersecurity talent, Kyaw Min Thein.&amp;nbsp; 

_______________________________________ 







_______________________________________ 


1) A bit about yourself.

My name is Kyaw Min Thein. I&#39;m current a final year student at </atom:summary><link>http://bl0g.yehg.net/2018/12/interview-with-cybersecurity-talent.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLli6kt-KMtDxIgcNteMkuRdlUh_Fdn1tia_rEsKZEVJ1L7Xh4E0ehpoYok09K7Vvr4et0p36b3T7Pw3a9Z65Z-FEat0EPWrf6JzEFhIWrfXStZuepNdUjbpQySSQWX407su7PoitprZ3m/s72-c/15492315_1907809259449451_117884095593199066_n.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-371309454191444298</guid><pubDate>Tue, 30 Jul 2019 07:06:00 +0000</pubDate><atom:updated>2019-07-30T00:06:28.985-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">tools</category><title>Obfuscator using Windows Environment Variables</title><atom:summary type="text">




https://yehgdotnet.github.io/attack/obfuscator-using-env-vars.htm 



#redteam #mitreattack pic.twitter.com/tMjMhOPFpI
— cybersecurity.wtf (@CyberSecWTF) July 30, 2019

</atom:summary><link>http://bl0g.yehg.net/2019/07/obfuscator-using-windows-environment.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-8076750872039216848</guid><pubDate>Fri, 26 Jul 2019 22:11:00 +0000</pubDate><atom:updated>2019-07-26T15:21:16.602-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">interviews</category><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with CyberSecurity Talent: Sai Wynn Myat</title><atom:summary type="text">



Cybersecurity/
 Ethical Hacking/ Bounty Hunting have captured the hearts of young 
talents in Myanmar.&amp;nbsp; This month, YEHG is wholeheartedly proud to feature
 a young cybersecurity talent, Kyaw Sai Wynn Myat.

_______________________________________&amp;nbsp;




_______________________________________ 




1) A bit about yourself.



My name is Sai Wynn Myat aka sailay. I&#39;m currently work at </atom:summary><link>http://bl0g.yehg.net/2019/07/interview-with-cybersecurity-talent-sai.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR11hA0l2P-kWQ4mu5BElD_yeE_L6aVNYGeHXNBGJPdTAgaqCVuAeZf_-BNU6K_S3Wf6l0dZ8T_QEsuxwra3R0TJN1MPjMZZP6Kd6GD0lGB__BQckffhnqmLniHRnEEUnVgiGsqWQ_Cupo/s72-c/a.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-549641013830257139</guid><pubDate>Sat, 15 Jun 2019 03:55:00 +0000</pubDate><atom:updated>2020-04-27T05:36:57.398-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">interviews</category><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with CyberSecurity Talent: Aye Hein Zayar</title><atom:summary type="text">


Cybersecurity/
 Ethical Hacking/ Bounty Hunting have captured the hearts of young 
talents in Myanmar.&amp;nbsp; This month, YEHG is wholeheartedly proud to feature a young 
cybersecurity talent, Aye Hein Zayar.&amp;nbsp;&amp;nbsp; 

_______________________________________ 










_______________________________________ 


1) A bit about yourself 

- I am Aye Hein Zayar. Some called me Zayar and some </atom:summary><link>http://bl0g.yehg.net/2019/06/interview-with-cybersecurity-talent-aye.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHqllsFXmlTvPi0NyygE5_Tt9pnP5_jOIOKgkH0vmO5QJsEA_thsYBFOZ8_94RIta17YwAaFPXJpFFwWuXajGX-35Z3-oHnq07oMVcbNnar6VmNM0wxlIpYSf-KZamLD3YACmfQ160aiKK/s72-c/signal-2019-06-15-044602.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-6253989205813031779</guid><pubDate>Sun, 02 Jun 2019 15:13:00 +0000</pubDate><atom:updated>2019-06-10T06:38:24.463-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">interviews</category><category domain="http://www.blogger.com/atom/ns#">talent-highlights</category><title>Interview with CyberSecurity Talent: Kyaw Thiha</title><atom:summary type="text">


Cybersecurity/
 Ethical Hacking/ Bounty Hunting have captured the hearts of young 
talents in Myanmar.&amp;nbsp; This month, YEHG is wholeheartedly proud to feature a young 
cybersecurity talent, Kyaw Thiha.&amp;nbsp; 

_______________________________________ 





_______________________________________ 


1) A bit about yourself 

I am Kyaw Thiha , currently working as Cyber Security Consultant in </atom:summary><link>http://bl0g.yehg.net/2019/06/interview-with-cybersecurity-talent.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaX8k1aEhIV5GhDU0Q_aIpsAzCe_TbftUrqoA4L4s3lDUr0q0lxeVagmfVib-za7lxeXzI-9KBARximX_MqnmsM65fg9f7qXaKwtM2dzLNU6TdPB7PTM1ejoGF3U3OXAFJcbngIJLlKTxt/s72-c/kth.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-4631009458333744487</guid><pubDate>Sun, 22 Apr 2018 07:32:00 +0000</pubDate><atom:updated>2018-04-22T01:23:25.007-07:00</atom:updated><title>Burp Extension - Bing Translator</title><atom:summary type="text">






Testing non-English web apps is pretty straightforward which you can just use browser extension to translate what you see on screens. But that&#39;s not so straightforward for non-English mobile apps especially where no English support is available; in this case, pentesters have no choice but to translate each foreign keywords manually using browser navigating to translator web site.....

</atom:summary><link>http://bl0g.yehg.net/2018/04/burp-extension-bing-translator.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdNyFKl1jxh5yk93kqN2GHjp08-ySsmqz8axZgV9QoMaMpU8r8nxufh6UwExAMNZtAv5jVkL_KFrw5u0t30Jh8ktHIlguLTm3XDDh0OmPF6XoMTG4VgH2-kXlDaxemWN5ai5i1W4NaRZ9N/s72-c/WhatsApp+Image+2018-04-18+at+1.25.23+AM.jpeg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-8168333289681669741</guid><pubDate>Mon, 26 Mar 2018 07:50:00 +0000</pubDate><atom:updated>2018-12-29T23:12:18.589-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">tools</category><title>pyt (python secure code scanner) wrapper</title><atom:summary type="text">

Quick and dirty wrapper as pyt doesn&#39;t support scanning directory from first look




https://gist.github.com/yehgdotnet/074ab79528ccdac7653bb641beb3b7c5





# https://github.com/python-security/pyt - python secure code scanner

@echo off 
IF %1.==. GOTO No1
IF %2.==. GOTO Missing_Argument

set dir=%1
set type=%2

dir /s /b %dir% | find &quot;.py&quot; &amp;gt; source_listing.txt
for /F &quot;tokens=*&quot; %%A in (</atom:summary><link>http://bl0g.yehg.net/2018/03/pyt-wrapper.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-8580307045917049778</guid><pubDate>Sat, 17 Mar 2018 03:04:00 +0000</pubDate><atom:updated>2018-03-16T20:04:59.431-07:00</atom:updated><title>GitBook Released: Secure Code - PHP</title><atom:summary type="text">








https://yehgdotnet.gitbooks.io/secure-php-codes/content/

This Gitbook serves as ready-to-use one-place reference for PHP secure codes that have been implemented in various sources/frameworks/articles on the web. Copyright and licensing belong to respective owners. If you like to implement them into your commercial products, make sure you check the source and its licensing terms for </atom:summary><link>http://bl0g.yehg.net/2018/03/gitbook-released-secure-code-php.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-1191520995783434968</guid><pubDate>Wed, 14 Feb 2018 03:49:00 +0000</pubDate><atom:updated>2018-02-13T19:54:53.433-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">tools</category><title>Evilsocket plugins: replaceimage,  injectjson, injecttext</title><atom:summary type="text">
# evilsocket-plugins

Modified evilsocket&#39;s bettercap plugins 
minimally changed from existing ones written by the author Simone&amp;nbsp; 
&#39;evilsocket&#39; Margaritelli.&amp;nbsp;&amp;nbsp;&amp;nbsp; Credit goes to the author for creating 
such awesome easy moduler tool. 

https://github.com/yehgdotnet/evilsocket-plugins 

Instructions:

1. Git clone
2. Place it the orginal source folder
</atom:summary><link>http://bl0g.yehg.net/2018/02/evilsocket-plugins-replaceimage.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2595502479307004038.post-3605867489551233660</guid><pubDate>Fri, 29 Dec 2017 12:46:00 +0000</pubDate><atom:updated>2017-12-29T04:46:12.342-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">tools</category><title>DOM XSS Baker</title><atom:summary type="text">https://github.com/yehgdotnet/domxssbaker


With potential DOM XSS findings from Burp Plugins, we end up reading complex JavaScript codes. At the end of the day, majority of DOM XSS come from location/href objects appended with # hag.

This little script takes a list of URLs (which you can copy from Burp) and make a unique list and open your default browser every 15 seconds interval or interval </atom:summary><link>http://bl0g.yehg.net/2017/12/dom-xss-baker.html</link><author>noreply@blogger.com (Unknown)</author></item></channel></rss>