top of page



Rich Washburn
Jun 12, 20243 min read
The Power and Peril of Shodan
Shodan a formidable search engine designed explicitly for hackers and cybersecurity analysts. It serves as a window into the vast, often...
1 view
0 comments


Rich Washburn
Apr 29, 20242 min read
How John The Ripper Shapes Modern Password Safety
John The Ripper, often abbreviated as "JtR" or simply "John," more than just a password cracker is also a comprehensive framework for...
1 view
0 comments


Rich Washburn
Apr 29, 20242 min read
Essential Command Line Hacking Tools
Understanding command line tools isn't just for the tech-savvy; it's a fundamental skill for anyone interested in securing their digital...
0 views
0 comments


Rich Washburn
Apr 26, 20242 min read
Dangerous Hacking Gadgets Available on Amazon
Amazon, known for its vast assortment of products, surprisingly offers a range of devices that, while marketed for educational and...
1 view
0 comments


Rich Washburn
Apr 2, 20242 min read
Reverse Shell with DNS Data Bouncing Exfiltration
At its core, a reverse shell is a hacking technique that allows an attacker to gain control over a target's computer system remotely. The...
243 views
0 comments


Rich Washburn
Feb 21, 20242 min read
Inside the Chinese Hacking Tools Giga Leak
The recent discovery of a massive data leak, purportedly revealing the inner workings and cyber espionage tools of a Chinese company, has...
6 views
0 comments

Rich Washburn
Jan 13, 20242 min read
WordPress sites are a problem: A Nerd's Candid Rant
As a web designer “moonlighting” as a Certified Ethical Hacker (yeah, it's as cool as it sounds), I’ve witnessed WordPress security flaws...
22 views
0 comments


Rich Washburn
Dec 9, 20232 min read
Using PhoneInfoga for Digital Forensics
PhoneInfoga, a versatile tool for digital forensics and ethical hacking. PhoneInfoga is designed to uncover detailed information about...
44 views
0 comments
bottom of page