FortitudeOver the last few weeks, we have gone down the rabbit hole of entering the world of hacking. There are two paths when we come to the point…Feb 2, 2021Feb 2, 2021
Analyze, Testing, and StrategyReconnaissance information is of critical importance. The proper collection and classification will help with decerning targeted analysis…Jan 28, 2021Jan 28, 2021
ReconnaissanceDefensive strategies require understanding how an adversary will employ tactics to determine weaknesses. Offensive strategies are often…Jan 18, 2021Jan 18, 2021
Different Ops, Creative HoneypotsCovert ops exist globally and domestically, many share a common goal but require an sizeable quantity of work to accomplish their goals…Jan 15, 2021Jan 15, 2021
Linux OpSec, Hardening, and DefenseNow that we are off to a fresh start to 2021, it is a good idea to install Linux for the new device we have obtained. In this article, I…Jan 12, 2021Jan 12, 2021
A new year and a new you.2020 was a hell of a year for most people. Privacy is being eroded quicker under the pandemic, but there is a silver lining. In the new…Jan 5, 2021Jan 5, 2021
Metadata and You, Shallow End EditionThis article is an introduction to metadata, some of the overlooked methods in how it is collected, and the precursors of profiling. The…Dec 21, 2020Dec 21, 2020
Hidden Services, that stay hidden…This article was requested on how to set up hidden services that would protect the operator. Like most things, there is an easy way and a…Dec 14, 2020Dec 14, 2020
AlternativesWe take a lot for granted. What happens when we can no longer rely on the way we normally use internet or power? What happens if you are…Dec 3, 2020Dec 3, 2020
Using Tor for more than browsing.This article is a collection of interesting methods to use the Tor network for more than just what it is perceived to be used for. This is…Dec 2, 2020Dec 2, 2020