top of page



The Power and Peril of Shodan
Shodan a formidable search engine designed explicitly for hackers and cybersecurity analysts. It serves as a window into the vast, often...

Rich Washburn
Jun 12, 20243 min read


How John The Ripper Shapes Modern Password Safety
John The Ripper, often abbreviated as "JtR" or simply "John," more than just a password cracker is also a comprehensive framework for...

Rich Washburn
Apr 29, 20242 min read


Essential Command Line Hacking Tools
Understanding command line tools isn't just for the tech-savvy; it's a fundamental skill for anyone interested in securing their digital...

Rich Washburn
Apr 29, 20242 min read


Dangerous Hacking Gadgets Available on Amazon
Amazon, known for its vast assortment of products, surprisingly offers a range of devices that, while marketed for educational and...

Rich Washburn
Apr 26, 20242 min read


Reverse Shell with DNS Data Bouncing Exfiltration
At its core, a reverse shell is a hacking technique that allows an attacker to gain control over a target's computer system remotely. The...

Rich Washburn
Apr 2, 20242 min read


Inside the Chinese Hacking Tools Giga Leak
The recent discovery of a massive data leak, purportedly revealing the inner workings and cyber espionage tools of a Chinese company, has...

Rich Washburn
Feb 21, 20242 min read


WordPress sites are a problem: A Nerd's Candid Rant
As a web designer “moonlighting” as a Certified Ethical Hacker (yeah, it's as cool as it sounds), I’ve witnessed WordPress security flaws...

Rich Washburn
Jan 13, 20242 min read


Using PhoneInfoga for Digital Forensics
PhoneInfoga, a versatile tool for digital forensics and ethical hacking. PhoneInfoga is designed to uncover detailed information about...

Rich Washburn
Dec 9, 20232 min read
bottom of page