PinnedChris KubeckainHackerNoon.comMy Top 10 Favorite CIA & NSA SubdomainsInteresting discoveries over the years using Robtex & Censys.ioMay 24, 2023May 24, 2023
Chris KubeckainHackerNoon.comSanction vs Bitcoin miningCan’t use the US dollar? Try cryptocurrency insteadJul 8, 20192Jul 8, 20192
Chris KubeckainHackerNoon.comHow cyber war affects humanitarian aidImagine a dramatic, airport novel, most communications are down, electric and water service intermittent, internet services like Snapchat…Jan 7, 2019Jan 7, 2019
Chris KubeckainHackerNoon.comBitCoins & PyramidsScams abound when money’s aroundMay 4, 2018May 4, 2018
Chris KubeckainHackerNoon.comSpies Like Us3rd party providers are difficult to secure, even for spooksMay 2, 20181May 2, 20181
Chris KubeckainHackerNoon.comDiscovering hackable printers with ease on the internetHappy hacker joy with wide open printers on the internetApr 30, 2018Apr 30, 2018
Chris KubeckainHackerNoon.comThe Road to Hell is Paved with Bad PasswordsReviewed by Steve Ragan (SteveD3)Apr 22, 2018Apr 22, 2018
Chris KubeckainHackerNoon.comBreaking Software Integrity with NTFS StreamsFor security purposes, many applications use hashing to ensure software integrity. We’re going to get all CIA level and break that sh*t.…Mar 27, 20182Mar 27, 20182
Chris KubeckainHackerNoon.comTop Strategies for censored and sued security researchers and hackersThe post’s been delivered and most of us dread any possible bills lurking inside the mailbox. However, as a security researcher there’s a…Feb 20, 20181Feb 20, 20181