Georgia WeidmanAutistic Toxic Nightmare Girl: A Trainwreck’s Travelogue (Part 1)[Note: I wrote this in 2019 before COVID-19 and right after the Tribe of Hackers summit. For whatever reason, I never released it. I…5d ago5d ago
Georgia WeidmanFive-Minute Web App Security AssessmentThis post will examine three free online tools for checking websites for common security misconfiguration vulnerabilities. Before we dive…Jun 24Jun 24
Georgia WeidmanMy Journey to Achieving the LinkedIn Top Voice in Cybersecurity: A Tale of Rapid Success in Just 2…(And in the top 2% of quality contributors in less than a week)Jun 17Jun 17
Georgia WeidmanExploit Development Space Issues: A Relative JumpNote: These are writeups for the exercise for a previous version of my Exploit Development class that I’m not releasing for free. They…Apr 1, 2020Apr 1, 2020
Georgia WeidmanDefence Against the Dark Arts: Hacking Isn’t MagicAdditional thoughts about my panel at the Bloomberg “Sooner Than You Think” conference on data breaches.Nov 21, 2019Nov 21, 2019
Georgia WeidmanAdditional Book Exercises: Apache Tomcat Guessable CredentialsIn the first edition of Penetration Testing: A Hands-On Introduction to Hacking, you looked at specific examples of vulnerabilities. My…Apr 18, 2019Apr 18, 2019
Georgia WeidmanShitsco CTF Problem WalkthroughAn in-depth beginner friendly walkthrough of a previous Defcon Capture the Flag problem. Ideal for readers of my Penetration Testing book.Feb 26, 20194Feb 26, 20194
Georgia WeidmanCFP Yoga PantsA story about the time I secretly listened in on a CFP review call.Feb 17, 2019Feb 17, 2019
Georgia WeidmanChanges in Pattern RecognitionMy Women’s Cyberjutsu award speech. A call to arms for women in Cybersecurity.Feb 3, 2019Feb 3, 2019
Georgia WeidmanCyberSecurity Lion RepellantExploring the past, present, and future of cybersecurity challenges.Jan 7, 20193Jan 7, 20193