PinnedThe Start of a 100 Day Coding JourneyThe beginning of the 100DaysOfCode challenge wasn’t dissimilar to my experience beginning the 146 days I spent on the Pacific Crest Trail…Feb 18, 202191Feb 18, 202191
Published inInfoSec Write-upsWiFi Hacking Week Pt. 4 — Evil Twin AttacksIf you are reading this that means you’ve either made it to the fourth post in this series on WiFi security, you accidentally clicked this…Apr 18, 202241Apr 18, 202241
WiFi Hacking Week Pt. 3 — Abusing the InfrastructureWelcome to part three of a five (six?) part series on WiFi security and lack thereof. In the last article we covered basic WiFi recon on…Dec 10, 202121Dec 10, 202121
WiFi Hacking Week Pt. 2 — ReconnaissanceThis is the second part in a four (five?) part series on WiFi security and the dangers of not being aware of it. I would recommend reading…Nov 21, 20214Nov 21, 20214
100DaysOfCode — Halfway ThereWhen I was a kid one of my favorite things to do was play with Legos.Mar 25, 20211Mar 25, 20211
Subdomain and IP Reconnaissance — A Bug Bounty JournalIn my first journal entry I walked through performing horizontal domain reconnaissance on Apple’s network in order to find a complete list…Mar 11, 202124Mar 11, 202124
Horizontal Domain Reconnaissance — A Bug Bounty JournalIn terms of being late or not starting at all, then it’s never too late. — Alison HeadleyMar 11, 202157Mar 11, 202157