InfiltrateOpsEyes Everywhere: Unveiling Real-Time Risks in the Digital BattlefieldHow Shodan Exposed Security Forces2 min read·Apr 7, 2024----
InfiltrateOpsHacking Apple: Two Successful Exploits and Positive Thoughts on their Bug Bounty ProgramHacking Apple is no easy feat. With some of the most talented security professionals working on protecting their systems, it’s hard to…9 min read·Feb 16, 2023--3--3
InfiltrateOpsThe Castle’s LatrineYour keep is my keep. A story from when I worked for a previous employer.4 min read·Oct 14, 2022----
InfiltrateOpsCloud Enumeration Series: Discovering Azure Websites using ffufAs part of my Azure Cloud Enumeration process, I like to make use of the web fuzzing tool ffuf to fuzz azurewebsites.net for subdomains…1 min read·Oct 1, 2022----
InfiltrateOpsCloud Enumeration Series: Finding AWS Buckets with ffufYou’ve probably heard of ffuf, the web fuzzer by joohoi. It’s a great tool, and I use it often. I find ffuf to be incredibly fast and easy…2 min read·Sep 30, 2022----
InfiltrateOpsI found your keys — secrets on GitHubSecrets are, well, secrets, and it boggles the mind that I frequently find them on GitHub. In this post, we will discuss how I often…3 min read·Sep 26, 2022----
InfiltrateOpsTesla paid me $10,000 because of Directory IndexingMany people are interested in trying Bug Bounties, but they feel they won’t be able to find anything. I hope that my success will serve as…2 min read·Sep 25, 2022--13--13