You know what I’m thankful for? Target.  Where else are you going to find a 6 shelf, 80 inch bookcase for $35?  Sure, it’s made of cheap wood and sways I bit if I bump into it, but hell… I gotta display my excessive collection of books some how.  If I’m going to spend a […]

At this point, I’m sure you’ve all heard about Apple’s on-going fight with the FBI over allowing backdoors into iPhones.  In the world of cyber security, encryption, and privacy, this is the battle that will set the tone for the impending war.  I have an enormous amount of respect for Apple’s CEO, Tim Cook.  In an […]

Considering the massive response I got from the last post about Shodan, I figured I should do a follow up.  Thank you to all who re-tweeted the link, and a big shout out to John Matherly, founder of Shodan, for the publicity.  Bro of the year.  If you haven’t read through my last post, I […]

I know how hard it is for recent college graduates to snag that first big interview, so a big congratulations to you. That’s the first step to entering the cyber security profession.  I also know how intimidating it can be trying to prepare for it.  I figured I’d share some of the experiences I’ve had […]

Buckle up, this is going to be quite the ride.  Burp Suite is a web application penetration tester’s bread and butter, a powerful suite of tools that covers everything you could ever want, need, or dream.  I’ll do my absolute best to cover everything in depth, but there’s quite a bit. Here’s a quick list […]

At this point, I think it’s a relatively well known fact that passwords should be hashed in storage.  If you or your development teams are storing passwords in plain text, the keys to every user’s kingdom are sitting there begging to be stolen.  Really, all it takes is one little SQL injection to expose every user’s password […]

I remember during my senior year of college the struggle and confusion surrounding where to start my career.  Luckily, I had a very helpful professor who gave me an overview of the different paths a security professional can take.  As I started my career, it became apparent that it wasn’t as simple as he explained. […]

If you haven’t had a chance to read through any of the 2015 reports yet, I’d highly suggest taking some time to do so.  The data presented in these reports is highly valuable to any information security professional, and it really gives a clear overview of how the field is changing year by year.  Two […]

I don’t know about you guys, but I’m constantly on Amazon looking for new books to read.  I’ve managed to acquire a decent collection of books and read through the majority of them.  I figured I’d share a few of my favorites, and give a little insight on each of them. The Web Application Hacker’s […]

Someone once said that “no security hole is too small”.  The longer you work in the information security field, the more relevant this becomes.  So many times, it’s been shown that the tiniest details can lead to massive data breaches.  The 2013 Target breach is a prime example.  Attackers first broke into Targets network on […]