top of page



The Power and Peril of Shodan
Shodan a formidable search engine designed explicitly for hackers and cybersecurity analysts. It serves as a window into the vast, often...

Rich Washburn
Jun 12, 20243 min read
1 view
0 comments


How John The Ripper Shapes Modern Password Safety
John The Ripper, often abbreviated as "JtR" or simply "John," more than just a password cracker is also a comprehensive framework for...

Rich Washburn
Apr 29, 20242 min read
1 view
0 comments


Essential Command Line Hacking Tools
Understanding command line tools isn't just for the tech-savvy; it's a fundamental skill for anyone interested in securing their digital...

Rich Washburn
Apr 29, 20242 min read
0 views
0 comments


Dangerous Hacking Gadgets Available on Amazon
Amazon, known for its vast assortment of products, surprisingly offers a range of devices that, while marketed for educational and...

Rich Washburn
Apr 26, 20242 min read
2 views
0 comments


Reverse Shell with DNS Data Bouncing Exfiltration
At its core, a reverse shell is a hacking technique that allows an attacker to gain control over a target's computer system remotely. The...

Rich Washburn
Apr 2, 20242 min read
243 views
0 comments


Inside the Chinese Hacking Tools Giga Leak
The recent discovery of a massive data leak, purportedly revealing the inner workings and cyber espionage tools of a Chinese company, has...

Rich Washburn
Feb 21, 20242 min read
6 views
0 comments


WordPress sites are a problem: A Nerd's Candid Rant
As a web designer “moonlighting” as a Certified Ethical Hacker (yeah, it's as cool as it sounds), I’ve witnessed WordPress security flaws...

Rich Washburn
Jan 13, 20242 min read
22 views
0 comments


Using PhoneInfoga for Digital Forensics
PhoneInfoga, a versatile tool for digital forensics and ethical hacking. PhoneInfoga is designed to uncover detailed information about...

Rich Washburn
Dec 9, 20232 min read
47 views
0 comments
bottom of page