Scott EggimanninOSINT TeamUnveiling the Digital Trail: A Comprehensive OSINT Geolocation ExpeditionIn this article, I’m going to show you the steps I used to geolocate an image challenge using publicly available tools and open-source…Sep 11, 2023Sep 11, 2023
Scott EggimanninOSINT TeamHow to Protect Yourself by Removing Geolocation Data from Your PhotosHow much does the average person know about the hidden data in the photos you take on your phone?May 4, 2023May 4, 2023
Scott EggimanninThe Gray AreaHow to Get a Reverse Shell on macOS Using A Flipper Zero as a BadUSBUsing a Flipper Zero, a short 12-line DuckyScript text file, and a remote listener on my Ubuntu server I was able to gain a shell.Dec 3, 20221Dec 3, 20221
Scott EggimannHow to Make a Malicious USB Device and Have Some Harmless FunUsing an old USB drive, you can build your own malicious BadUSB using Windows shortcut files to link to malware. An LNK file shortcut…Oct 15, 2022Oct 15, 2022
Scott EggimannLinux Shell for BeginVirtualization and cloud computing has made setting up Linux servers easy and available for anyone. At any one time, I manage up to 10…Aug 22, 2022Aug 22, 2022
Scott EggimannYour Wi-Fi Cameras may be getting AttackedWhen we think of denial of service (DoS) attacks we tend to think of the massive, distributed denial of service (DDoS) attacks run by…Aug 17, 2022Aug 17, 2022
Scott EggimannConfiguring the Alpha AWUS036ACH Wi-Fi Adapter on Kali LinuxSearch the Internet for the best Wi-Fi Adapter for Kali Linux and the Alpha Networks AWUS036ACH comes up in the Top 5 every time for its…Jun 27, 2022Jun 27, 2022
Scott EggimanninSystem WeaknessUnderstanding Weaponized USB DevicesWhat is a Ransomware Attack?Jun 23, 2022Jun 23, 2022
Scott EggimanninSystem WeaknessHow Wi-Fi is Vulnerable with a Wifi DuckyThe Wifi Ducky or Wifi Duck is a small stealthy device that hackers can use as an entry point into your network. These pentest devices work…Jun 20, 2022Jun 20, 2022
Scott EggimannHow Mom Got HackedI never realized how easy it was to get a username and password to an email account until my mother was hacked. Listening to her explain…Jun 10, 2022Jun 10, 2022