Search
TOOLS DON'T MAKE HACKERS, HACKERS MAKE TOOLS. An info sec junkie's professional path. Professional pentester and Red Teamer since October 2018. I love hacking and coding and I hope I can give my little knowledge back to the community and help make information systems more secure. This blog focuses on information security and white hat hacking, i.e. hacking based on the client's authorization. Hacking must be done responsibly: don't ruin people's lives and businesses.
Posts
Showing posts from August, 2017
Contact Form
Tips for an Information Security Analyst/Pentester career - Ep. 18: OSINT (pt. 4)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 17: OSINT (pt. 3)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Episode 16: IPv6 DoS attack
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Episode 15: OSINT (pt 2)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Episode 14: OSINT (pt 1)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Episode 13: File Upload (DVWA)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Episode 12 (reviewed version): Blind SQL injection with DVWA
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Episode 11: Mutillidae II (brief introduction)
- Get link
- X
- Other Apps