Recent Posts

Using Metadata To Perform Reconnaissance

1 minute read

Before hacking (red teaming, pen-testing, etc.), you must carry out a recon on the company. Almost every company has a public website with documents. These d...

Vulnerability Disclosure

1 minute read

Recently, I got a question from a young hacker about how to start with Responsible Disclosures. This is a tutorial to contribute to the online Security of Th...

One Conference 2018

less than 1 minute read

This year was the first time I visited the One Conference. During the event, I went to some technical talks and had fun with a lot of people. But at the begi...

Hak5 Packet Squirrel

1 minute read

A week ago, I ordered some tools from Hak5. The Lan turtle and the Wifi Pineapple. I always watch the video’s from the Hak5 Youtube channel and saw them play...

Webhacking

less than 1 minute read

After reading the book The Web Application Hacker’s Handbook. I thought why not make a checklist for hacking websites with tools, tips and write-ups. And so ...