This talk is about methodologies and tools that we use or have coded that make our lives and pentest schedule a little easier, and why we do things the way we do. Of course, there will be a healthy dose of Metasploit in the mix.
What is a VPN?
A Virtual Private Network, commonly referred to as a VPN, is a technology that creates a secure and encrypted connection between your device and the internet. It acts as a private tunnel for your online activities, shielding them from prying eyes and potential cyber threats. Originally developed to enable secure communication within corporate networks, VPNs Read More …
Conference Video – Fantastic OSINT and where to find it
Open-Source security intelligence is bountiful if you know where to look. The goal of my talk is show you where to find this data, how to utilize it, and how the data you find can be enriched through free and/or commercial tools.
Elmo adds to his conflict of interest
Just wanting to add to the growing list of issues with DOGE, and Elmo’s ability to decide what is a good or bad government program. Musk’s Starlink gets FAA contract At this point, he is just being blatant about it, knowing that there is hardly anything anyone can do, because the petty orange man-baby is Read More …
So many Leopards
So many of these posts on Social Media these days. ofc, this is the echo chamber that I am served by these platforms. So it this what I want to see, or what it thinks I want to see? I can honestly say, that it is getting exhausting muting, blocking, and unfollowing all of the Read More …
DMTA – Beastie Boys – Paul’s Boutique
This is a tough album for me to review. The reason I picked it first was it fulfilled 2 requirements. One is simply enough, I owned the album. The next requirement, was that it was first in alphabetical order of the albums I owned. OK, on to why this is tough to review. I Read More …
UDP and Its Role in Online Communication
The User Datagram Protocol (UDP) is one of the foundational protocols of the internet, widely used for applications where speed and efficiency are prioritized over reliability. This article explores what UDP is, how it works, and why it is often chosen over Transmission Control Protocol (TCP) for specific use cases, particularly in online communication and Read More …
Conference Video – OSINT: Oh the places you’ll go
Justin Brown (Spridel) Open Source Intelligence (OSINT) is what many of us do on a daily basis. We may not acknowledge it. We perform research, digital foot printing, competitive intelligence, and reconnaissance, just to name a few. Come find some additional resources for your efforts, listen to what should be collected, how to perform collection, Read More …
Hacker Video – Theme: Big Breaks
A video I uploaded for my dear friend Cory Doctorow, from the Moth Story-telling competition.
The Internet Protocol: The Backbone of Online Communication
The Internet Protocol (IP) is one of the most essential components of modern networking, enabling seamless communication between devices across the globe. This article explores what the Internet Protocol is, how it works, and why it is crucial for online communication. What is the Internet Protocol? The Internet Protocol (IP) is a set of rules Read More …