top of page

Breaking the Signal: Going into the wireless network
To footprint a wireless network, We must identify the BSS (Basic Service Set) or Independent BSS (IBSS) provided by the access point....
Jan 43 min read

Art of Reconnaissance: From Battlefield to Browser - PART 0010
0010 : Footprinting Through Web services Web Services: Platforms like social networks and job sites reveal organizational data (e.g.,...
Dec 23, 20245 min read

Art of Reconnaissance: From Battlefield to Browser — PART 0001
Ancient and Medieval Techniques Scouts and Spies : Greeks, Romans, and Chinese used scouts and spies to gather intel on enemies. Assyrian...
Dec 22, 20244 min read

Behind the Commendation: Cyberforce 2024 and My Approach to Vulnerability Documentation.
When I worked on the vulnerability documentation for the Cyberforce program 2024, I focused on making it clear, structured, and easy to...
Dec 12, 20243 min read

S3 Buckets and Privilege Elevation: What Could Go Wrong?
1. Cracking the Cloud: Public or misconfigured S3 Buckets, what I excited and Security Oopsies. Amazon offers something called blob...
Dec 11, 20244 min read


Computer Breach and Data Loss (Basic Essential)
Overview of the Incident: A hacker gained access to the company's network through a phishing email that was sent to an employee. The...
Feb 29, 20247 min read


Vulnerability Management
60% of security patches happen because of unpatched vulnerabilities, updates, weaknesses, or threats. WHEN : Numerous security breaches,...
Dec 18, 20232 min read
bottom of page