top of page
![](https://static.wixstatic.com/media/11062b_c18db2b1461b46f2ad31bae61009fee1f000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/11062b_c18db2b1461b46f2ad31bae61009fee1f000.jpg)
![](https://static.wixstatic.com/media/ea5f86_7af543f47b47448ba3086190d8d1f5a2~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_7af543f47b47448ba3086190d8d1f5a2~mv2.webp)
![The Power and Peril of Shodan](https://static.wixstatic.com/media/ea5f86_7af543f47b47448ba3086190d8d1f5a2~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_7af543f47b47448ba3086190d8d1f5a2~mv2.webp)
Rich Washburn
Jun 12, 20243 min read
The Power and Peril of Shodan
Shodan a formidable search engine designed explicitly for hackers and cybersecurity analysts. It serves as a window into the vast, often...
1 view0 comments
![](https://static.wixstatic.com/media/ea5f86_f80a680b026c43c28a88e9b0b287074f~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_f80a680b026c43c28a88e9b0b287074f~mv2.webp)
![How John The Ripper Shapes Modern Password Safety](https://static.wixstatic.com/media/ea5f86_f80a680b026c43c28a88e9b0b287074f~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_f80a680b026c43c28a88e9b0b287074f~mv2.webp)
Rich Washburn
Apr 29, 20242 min read
How John The Ripper Shapes Modern Password Safety
John The Ripper, often abbreviated as "JtR" or simply "John," more than just a password cracker is also a comprehensive framework for...
1 view0 comments
![](https://static.wixstatic.com/media/ea5f86_b666fbd312e74568a58e2a294008b66d~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_b666fbd312e74568a58e2a294008b66d~mv2.webp)
![Essential Command Line Hacking Tools](https://static.wixstatic.com/media/ea5f86_b666fbd312e74568a58e2a294008b66d~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_b666fbd312e74568a58e2a294008b66d~mv2.webp)
Rich Washburn
Apr 29, 20242 min read
Essential Command Line Hacking Tools
Understanding command line tools isn't just for the tech-savvy; it's a fundamental skill for anyone interested in securing their digital...
0 views0 comments
![](https://static.wixstatic.com/media/ea5f86_67c76635f3544d2baee2e062eef0a388~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_67c76635f3544d2baee2e062eef0a388~mv2.webp)
![Dangerous Hacking Gadgets Available on Amazon](https://static.wixstatic.com/media/ea5f86_67c76635f3544d2baee2e062eef0a388~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_67c76635f3544d2baee2e062eef0a388~mv2.webp)
Rich Washburn
Apr 26, 20242 min read
Dangerous Hacking Gadgets Available on Amazon
Amazon, known for its vast assortment of products, surprisingly offers a range of devices that, while marketed for educational and...
1 view0 comments
![](https://static.wixstatic.com/media/ea5f86_488bbc6a46fe4c8eba909c003075e0c0~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_488bbc6a46fe4c8eba909c003075e0c0~mv2.webp)
![Reverse Shell with DNS Data Bouncing Exfiltration](https://static.wixstatic.com/media/ea5f86_488bbc6a46fe4c8eba909c003075e0c0~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_488bbc6a46fe4c8eba909c003075e0c0~mv2.webp)
Rich Washburn
Apr 2, 20242 min read
Reverse Shell with DNS Data Bouncing Exfiltration
At its core, a reverse shell is a hacking technique that allows an attacker to gain control over a target's computer system remotely. The...
243 views0 comments
![](https://static.wixstatic.com/media/ea5f86_3aa2de96e51b4bb89c3acc42f82940a8~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_3aa2de96e51b4bb89c3acc42f82940a8~mv2.webp)
![Inside the Chinese Hacking Tools Giga Leak](https://static.wixstatic.com/media/ea5f86_3aa2de96e51b4bb89c3acc42f82940a8~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_3aa2de96e51b4bb89c3acc42f82940a8~mv2.webp)
Rich Washburn
Feb 21, 20242 min read
Inside the Chinese Hacking Tools Giga Leak
The recent discovery of a massive data leak, purportedly revealing the inner workings and cyber espionage tools of a Chinese company, has...
6 views0 comments
![WordPress sites are a problem: A Nerd's Candid Rant](https://static.wixstatic.com/media/ea5f86_370ceceb2b72460894c9f4b9b23c6c22~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/ea5f86_370ceceb2b72460894c9f4b9b23c6c22~mv2.webp)
Rich Washburn
Jan 13, 20242 min read
WordPress sites are a problem: A Nerd's Candid Rant
As a web designer “moonlighting” as a Certified Ethical Hacker (yeah, it's as cool as it sounds), I’ve witnessed WordPress security flaws...
19 views0 comments
![](https://static.wixstatic.com/media/ea5f86_97679451ceb543c780541172614ffa09~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_97679451ceb543c780541172614ffa09~mv2.webp)
![Using PhoneInfoga for Digital Forensics](https://static.wixstatic.com/media/ea5f86_97679451ceb543c780541172614ffa09~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_97679451ceb543c780541172614ffa09~mv2.webp)
Rich Washburn
Dec 9, 20232 min read
Using PhoneInfoga for Digital Forensics
PhoneInfoga, a versatile tool for digital forensics and ethical hacking. PhoneInfoga is designed to uncover detailed information about...
44 views0 comments
bottom of page