AI
-

Nmap Basics
If there’s one tool every penetration tester should know it’s nmap. In this post, I’m going to teach you how to use it practically as one might use it in a real-world testing scenario. Don’t let the title fool you. Although we’re going to cover the basics here, we’re going to take a deeper dive
-

DNS Enumeration
Now, the fun begins. If you followed my last post about the basics of DNS, you should be armed and ready to tackle the subject of this post: DNS enumeration. DNS enumeration is the process of obtaining as much information about a target as possible by pulling from publicly available DNS records. This can expand
-

DNS Basics
In this post, I’ll go over the basics of DNS so that you’ll be primed and ready for my next post about DNS enumeration. Oftentimes, I feel like DNS doesn’t get the attention it deserves when enumerating services. I mean, it’s a relatively simple protocol. Although it’s simple, there’s a wealth of information that
-

How Crypto is Hacked
Crypto currencies are a relatively new form of digital currency that have become rapidly popular for their accessibility and high security. They are deemed incredibly secure because they operate on the block chain network. However, nothing is impervious to hacking. In this post, I’m going to go briefly over crypto currencies, the block chain, and
-
Switching to WordPress
It’s been a while since I’ve written a blog post. I’ve been super busy trying to figure out a way to host my personal website and blog in a way that was cheap and easy to maintain. Originally, I hosted my front-end on GitHub Pages and stored all of my blog posts on Google Sheets.
-
My Top 10 Favorite Pokemon!
Hello again! In this post, I’m going to take a little detour from the more serious tutorial posts and share my top 10 favorite Pokemon with you! I’m not much of a stats guru so my selection is going to be based mostly on looks. This is also going to exclude starter Pokemon (I’ll probably