CUPS VulnerabilityRecently, evilsocket released a document about remotely exploiting the CUPS service with root privileges. I’m going to take this…Sep 27Sep 27
OPSEC FailureBack on August 18th, 2023, I went to Starbucks with a friend of mine to grab a drink. Little did I know that this innocent trip would lead…Apr 21, 2023Apr 21, 2023
Mifare 1K ClassicI’ve recently started delving back into RFID attacks since a lot of businesses will likely be asking for physical PenTests or, at the…Nov 26, 2021Nov 26, 2021
Tunnelling Core Impact Through Cobalt StrikeI keep saying that my mission is to turn hackers into networkers and networkers into hackers. Having an understanding is great but having…Apr 29, 2021Apr 29, 2021
Rabbit HolesAs a hacker, we often go down rabbit holes of information when doing our thing. This could be trying to fully understand a protocol…Mar 17, 2021Mar 17, 2021
I Was Blocked or Why 280 Characters Isn’t Enough SometimesI’m usually pretty cool as a cucumber. I’ve learned that I don’t really give a shit about what people think of me. But this one… This one…Mar 17, 2021Mar 17, 2021
How I Got Into *SecEveryone has their own path and I’m not here to tell you my path is the right way or admonish anyone for choosing the path they take. I am…Feb 19, 2021Feb 19, 2021
Let’s Go PhishingOne request we get from clients often enough is a phishing campaign request to test their users on this form of Social Engineering. You…Feb 19, 2021Feb 19, 2021
Moonlander Keyboard ReviewI recently got my Zsa Moonlander keyboard (https://www.zsa.io/moonlander/) to replace my aging Truly Ergonomic Computer Keyboard (TECK —…Dec 4, 2020Dec 4, 2020
Two Systran Vulnerabilities and their ExploitsThese are my first two independently discovered vulnerabilities which I’ve requested CVEs for (and will update the article if/when I get…Dec 3, 2020Dec 3, 2020