Intercepting Web Requests
Intercepting Web Requests31MAY, 2022Days 8 -11Intercepting Web Requests100 Days of HackingOne of the things that a good vulnerability researcher, pen tester, or bug hunter will need is a solid grasp of tools used in the craft. While tools are plentiful, most are...
WordPress Security Assessment
BB JOB ROLE PATH - HTBWordPress Security AssessmentQuintius, Day 7 , 100 Days of Hacking22 March 2016Day 7 of the journey served to tie everything learned in Day 6 together. Still navigating my way down the Bug Bunty Job Path role, it’s now time to tackle the...
Hacking WordPress 101
Hacking WordPress 10125MAY, 2022Day 6Hacking WordPress 101100 Days of HackingInstead of moving linear through the Bug Bunty Path on HTB, I wanted to veer off path a sec and jump ahead to Hacking Wardress. With a user base that stretches as far and wide as WordPress...
Analyzing Unknown Binaries- Dynamically
Analyzing Unknown Binaries- DynamicallyQuintius, Day 2, 100 Days of Hacking22 May 2022When I said this journey was not going to be linear in nature, Day 2 is an example of that. Although I’m writing this on Day 5, the events occurred on Day 2. My initial curiosity was...
Sensitive Data Exposure and HTML Injection
Sensitive Data Exposure & HTML Injection21MAY, 2022Days 3 & 4Sensitive Data Exposure & HTML Injection100 Days of HackingToday I’ll be trotting along the adventurous Bug Hunting path. I’m forcing myself to empty all previous knowledge that I possess about...
Listing the database contents on non Oracle databases
SQL INJECTION ATTACKListing database contents on non Oracle DatabasesQuintius, Day 1, 100 Days of Hacking18 May 2022This is officially Day Two, but since it’ll be the first day writing about what I covered, we’ll let this be the official Day One. I'll start by...
100 Days of Hacking
100 Days of Hacking16MAY, 2022I've been away from pen testing specifically since about the first of the year. As much as I abhorred the fact of having to take a hiatus, I must admit that taking that long of the break, ironically, had its benefit. Namely, coming back...
The Twelve Keys of the Hacker’s Craft
The Twelve Keys Of The Hacker's CraftQuintius, Cybersecurity Consultant, Texas2 January 2022Photo by Markus Winkler on UnsplashI often post useful quotes to the timeline of my social media profiles. A visitor to my profile would find these quotes appearing often, in...
What’s missing in Cybersecurity?
Photo by Brittani Burns on UnsplashQuintius, Cybersecurity Consultant, Texas28 January 2022This post was inspired by three words- "women in tech". While the those words by themselves kind of just hangs in the air without any context, what transpired of them was rather...
An Incidental Encounter with a Threat Actor
An Incidental Encounter with a Threat ActorQuintius, Cybersecurity Consultant, Texas17 January 2022As a healthy exercise in reconnaissance and utilizing an OSINT methodology, I found my guy, or entity, or account behind a shady email and penetration testing proposal....
-
Unisex t-shirt
Price range: $25.00 through $29.50 -
Unisex Hoodie
Price range: $35.00 through $39.00 -
Unisex eco raglan hoodie
Price range: $45.50 through $49.50 -
-
Glass jar soy wax candle
$17.00 -
Short-Sleeve Unisex T-Shirt
Price range: $18.00 through $21.50 -
Embroidered Beanie
$19.50 -
Snapback Hat
$21.00 -
Champion Hoodie
Price range: $56.00 through $58.00 -
Embroidered Champion Packable Jacket
Price range: $49.00 through $52.00 -
Backpack
$44.50 -
Snapback Hat
$21.00