During a recent pentest engagement, I was reminded of an enumeration technique with wordpress. The weakness lies within xml in wordpress being enabled and it only becomes more vulnerable if you have credentials to test against the wordpress instance.
Blogs
Whenever I'm learning a new concept or methodology of some sort, I typically start with the question, "What is the purpose of this tool, protocol, port, etc?" I'm a pretty solutions focused individual and if the goal or purpose of said <insert> does not make complete sense to me, then I take it as a sign that it'll likely be...
2022 & Forward
Welcome to a revamp of my previous blogging. For anyone that closely follows me, you've probably noticed a slower approach from my end as far as content goes. A huge reason for that is that I'm now a mom <3.
This presentation was given at the Black Cybersecurity Association Conference (2020)
What is your dream job or career? If there were no barriers to doing what you love everyday, what would you choose to be doing?
From Zero To Analyst
You worked in education before? How did you end up in cyber security?"
So you want to be an ethical-hacker. Why is that? Hopefully not for malicious purposes. I, in no way, claim to be the 'best' hacker in the world (I'm on way to be though), so I can't command you to follow a certain path. Everyone has their own reasons for entering the ethical-hacking world and I wouldn't have it...