staging2.blog.infostruction.com
Open in
urlscan Pro
35.212.50.41
Public Scan
URL:
https://staging2.blog.infostruction.com/
Submission: On April 05 via api from US — Scanned from US
Submission: On April 05 via api from US — Scanned from US
Form analysis
2 forms found in the DOMGET https://staging2.blog.infostruction.com/
<form role="search" method="get" class="search-form" action="https://staging2.blog.infostruction.com/">
<label for="search-form-1">
<span class="screen-reader-text"> Search for: </span>
</label>
<input type="search" id="search-form-1" class="search-field" placeholder="Search …" value="" name="s">
<button type="submit" class="search-submit"><svg class="icon icon-search" aria-hidden="true" role="img">
<use xlink:href="#icon-search"></use>
</svg><span class="screen-reader-text"> Search </span></button>
</form>
POST /#wpcf7-f1985-p1941-o1
<form action="/#wpcf7-f1985-p1941-o1" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init">
<div style="display: none;">
<input type="hidden" name="_wpcf7" value="1985">
<input type="hidden" name="_wpcf7_version" value="5.9.3">
<input type="hidden" name="_wpcf7_locale" value="en_US">
<input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f1985-p1941-o1">
<input type="hidden" name="_wpcf7_container_post" value="1941">
<input type="hidden" name="_wpcf7_posted_data_hash" value="">
</div>
<div class="form_wrap" id="contact">
<p class="note">Your email address will not be published. Required fields are marked* </p>
<div class="first_wrap">
<p><label>Name<span>*</span></label><br>
<span class="wpcf7-form-control-wrap" data-name="your-name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" value="" type="text" name="your-name"></span>
</p>
<p><label>Email<span>*</span></label><br>
<span class="wpcf7-form-control-wrap" data-name="your-email"><input size="40" class="wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email" aria-required="true" aria-invalid="false" value=""
type="email" name="your-email"></span>
</p>
<p><label>Subject<span>*</span></label><br>
<span class="wpcf7-form-control-wrap" data-name="your-subject"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" value="" type="text" name="your-subject"></span>
</p>
</div>
<div class="last_wrap">
<p><label>Message<span>*</span></label><br>
<span class="wpcf7-form-control-wrap" data-name="your-message"><textarea cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required" aria-required="true" aria-invalid="false"
name="your-message"></textarea></span>
</p>
<p><input class="wpcf7-form-control wpcf7-submit has-spinner send" id="send" type="submit" value="SUBMIT"><span class="wpcf7-spinner"></span>
</p>
</div>
</div>
<p style="display: none !important;" class="akismet-fields-container" data-prefix="_wpcf7_ak_"><label>Δ<textarea name="_wpcf7_ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1"
name="_wpcf7_ak_js" value="1712355707977">
<script>
document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
</script>
</p>
<div class="wpcf7-response-output" aria-hidden="true"></div>
<input type="hidden" name="KIjgq_QM" value="Ry@nkbfGCM0o1QPu"><input type="hidden" name="ElAPermvkutX" value="7eOgXr"><input type="hidden" name="dAxO_-uZ" value="Dc86km"><input type="hidden" name="sEIVLRYT" value="fzL_raJF">
</form>
Text Content
Skip to content Menu * Home * About * Contact Scroll down to content Select LanguageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBulgarianCatalanChinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekHaitian CreoleHebrewHindiHungarianIcelandicIndonesianIrishItalianJapaneseKoreanLatvianLithuanianMacedonianMalayMalteseNorwegianPersianPolishPortugueseRomanianRussianSerbianSlovakSlovenianSpanishSwahiliSwedishThaiTurkishUkrainianUrduVietnameseWelshYiddish BLOG FOR IT PROFESSIONALS, HACKERS AND STUDENTS OF CYBER SECURITY BEHIND THE SCREENS: MY EXPERIENCE AT DIAMOND IT Posted by Infostruction on March 30, 2024 * March 30, 2024 * No Comments TL; DR: Navigating Challenges at Diamond IT: A Call for Change Starting my Project Engineer (Sr. Professional Services Engineer) job at Diamond IT (Bakersfield, CA) was fraught with issues, from needing login credentials for my workstation to dealing with outdated and malfunctioning equipment. My optimism for a structured training phase quickly faded as I encountered … ... READ MORE EVOLVING TOGETHER: FOSTERING A CULTURE OF SHARED WISDOM * February 12, 2024 * No Comments Our journey into the hidden struggles of customer support and the nuanced dynamics of workplace culture has brought us to a pivotal point: the challenge of sharing knowledge within our teams and organization. This is akin to unveiling the workings behind the “Wizard of Oz” — it’s not just about the individual behind the curtain but the collective effort sustaining the magic of Oz. We’re moving the spotlight from solo victories to the synergy of shared wisdom that lifts ... READ MORE MIMICKING MALICE: EXPLORING MALICIOUS TRAFFIC DISTRIBUTORS * January 27, 2024 * No Comments My journey into the depths of this blog began unexpectedly during a routine online exploration, where I stumbled upon a cyber threat. This scenario is common in our field, and other detailed analyses have been ongoing on groups like ‘Parrot TDS‘ and ‘Vextrio.’ as they continue shifting the tactics and techniques around these campaigns. These blog explorations often lead to discoveries that resonate with those of other researchers, given the vast data points they have to ... READ MORE CRAFTING CULTURE: THE BALANCE OF EGO, BIAS, BELIEFS * December 21, 2023 * No Comments My tech career went global early in terms of clientele, starting before I was legally allowed to drink. It’s been a dynamic path, guided by more than 30 managers in various industries, including managed services, manufacturing, and a large cybersecurity company. In my experience, I’ve noticed how a lack of self-awareness and differing values and beliefs can profoundly affect workplace behavior. These elements are crucial in shaping everyday interactions, conflict resolution strategie... READ MORE INTERNAL BATTLES: UNSUNG HEROES OF CUSTOMER SUPPORT * November 16, 2023 * No Comments In customer support, the true challenge often lies within: a constant battle for necessary internal help. These struggles have deepened my understanding of effective support throughout my career and driven me to develop better systems. They’ve empowered me to support colleagues who face similar internal obstacles and to be a voice holding others accountable for providing the necessary assistance. This journey has been about more than just overcoming hurdles; it’s been about improving... READ MORE THE CALL-FIRST CONUNDRUM: RETHINKING TECH SUPPORT EFFICIENCY * November 09, 2023 * No Comments It’s a familiar scene for many of us dealing with tech support: you hit a snag with a service, you put in the effort to explain it all in a support ticket, and then you wait, expecting that someone will take it from there. Instead, you get asked to set up a phone call. Aligning schedules for this call can stretch the whole process by days or weeks. When you finally get on the line, you often repeat the information you’ve already given. If your ticket gets stuck with someone ou... READ MORE BEYOND ASSUMPTIONS: SAILING TOWARD CUSTOMER-CENTRICITY * August 27, 2023 * No Comments Leaving assumptions behind, we've embarked on a journey of validation, customer engagement, and iterative growth as the compass to success. Join us in a new era of crafting experiences that truly resonate with customers. Anchored in insights, fueled by innovation.... READ MORE EGO’S VEIL: UNMASKING PERFORMATIVE ADVOCACY * August 22, 2023 * No Comments One day, during a brief lunch break from work, I stood in line at a local restaurant, craving a sandwich to refuel for the rest of the day. As I waited, a colleague approached me. Although we didn’t know each other well, they recognized me from the office and discussed ‘Cyber Patriot.’ This was a well-known competition where industry mentors teamed up with students to tackle hacking challenges. I had heard of it and engaged in the conversation, nodding in agreement and mentioni... READ MORE FINDING GOOD VENDORS: LESSONS FROM DENTAL CHAIRS * August 21, 2023 * No Comments Relocating to California brought about more than just a change in scenery; it posed an unexpected challenge—finding a reliable dentist. What may seem like an unrelated experience holds a profound analogy for understanding why customers meticulously choose vendors, especially when they have dozens and hundreds of others circling them at all times, like sharks in a competitive sea. Join me as I share my dental journey and how it illuminates the pitfalls of hasty vendor decisions. Dentist Analogy... READ MORE PRIVACY POWERHOUSES: OPTERY, KANARY, DELETEME, AND ONEREP * August 12, 2023 * No Comments Unmasking Data Detox Tools The term “Data Detox Tools” encompasses software applications and online services tailored to assist individuals in managing and overseeing their digital footprint and personal data across the expansive realm of the internet. In this context, the term “detox” metaphorically parallels the concept of purification, suggesting a process akin to eliminating unnecessary or potentially detrimental elements. In the digital sphere, a data detox entails t... READ MORE THE ENIGMATIC WORLD OF KEVIN MITNICK: STORIES OF HACKING AND REDEMPTION * July 19, 2023 * No Comments Once upon a time, in the mid-90s, I was drawn into a world of hackers and cybersecurity experts, seeking knowledge and inspiration. Among the names that echoed through our circles was that of Kevin Mitnick, a legendary figure revered for his audacious exploits and unmatched hacking prowess. Kevin’s stories were the stuff of legends, like how he managed to hack into the source code of cellphone towers, a feat that left us all in awe. But what truly amazed me was his daring act of mon... READ MORE INSTAGRAM ACCOUNT RECOVERY * November 29, 2021 * No Comments Is Instagram’s account recovery workflow disappearing on some accounts and devices? We’ve had reports from readers and friends who’ve had hacked Instagrams with no success in using Instagram’s published docs to recover the account once the attacker’s email and phone number have changed. Here’s a copy of the official Instagram post: I think my Instagram has been hacked. (Update 12/6 – After testing for weeks over 40 times we can see the option on an Andro... READ MORE CARD FRAUD – EXPRESS STORE 2401 * November 27, 2021 * 9 *** Update 9/12/22 *** – Thousands of people are visiting this blog regularly due to card fraud of their own via Express Store 2401. I have not been able to gather any more information from the companies involved, but I continue to dig deeper into how they’re stealing these cards and other parts of the operation. It’s ridiculous that it’s been going on this long and that Wells Fargo isn’t concerned with somebody stealing a card that’s never been used. &... READ MORE GOOGLE SPAMDEXING ATTACK * May 08, 2021 * No Comments Found an interesting Google Results injection against sites running Solr search. Attackers created links in an unknown place with search parameters being passed to the websites. Google crawled these source pages, following the links and accepting them as content. It’s not all that sophisticated, but remember, it’s results that matter in this game. Many more are on my Twitter from notifying the organizations of this clever little hack against Google’s results. 911: Google Webmas... READ MORE PHISH GALLERY & BLOG UPDATE * October 28, 2020 * No Comments A collection of phishing screenshots I've collected this year from various honeypots and other sources. We've worked with many organizations over the years to take down infrastructure related to these attacks. The trend I've seen across security products is that they block effectively, but it takes time. Secondly, the sites and email sources tend to go largely unreported. If you want to make a difference: Protect future victims by sending the abuse emails.... READ MORE VIEW ALL SEARCH Search for: Search FIXFINDER – SELF-HELP AUTOMATION Ad: FixFinder - Self-Help Automation platform that lowers your Tier-1 volume using a user empowering Desktop interface. FixFinder hooks into your existing MSP and IT tools to provide Unified Knowledge, Custom Wizards, Status Pages, Full Ticketing, and an Application library. Check it out! SECURITY LINKS * Annoying Blog * Any.Run * AT&T Blog * Attrition * Avanan * Bark * Beta News * Bruce Schneier * Bugtraq * Children Of The Night * CISA Alerts * Cisco Talos * Compassion * ComputerWorld * Daniel Miessler * DeepSentinel * DNSFilter * DShield * Electronic Frontier Foundation * Exploit Database * FixFinder * Folding@Home * GBHackers * Graham Cluley * Hybrid Analysis * Internet Storm Center * IT Security Guru * JoeSandBox * KrebsOnSecurity * Microsoft Security Blog * National Vulnerability Database * Packet Storm * Palo Alto Networks Blog * Privacy Paradox * Project Safe Childhood * Project Zero * Qualys * Reddit NetSec * SANS Blog * SANS Reading Room * Security Boulevard * Security Weekly * Sensors Tech Forum * SentinelOne * SourceFire Blog * Sqreen * Stay Safe Online * TAO Security * Thorn * Threatpost * Troy Hunt * Unit 42 * Virus Bulletin * VirusTotal * We Live Security * Wired * Zero Day WHO’S ONLINE Visits Today : 225 Visits Yesterday : 287 This Month : 1403 Total Visits : 529530 Who's Online : 1 Your IP Address: 38.132.118.75 WEB ABUSE REPORTS * Amazon AWS Abuse * Chrome – Malware URL * Chrome – Report Phishing * Cloudflare Abuse * Dreamhost Abuse * Gmail Abuse * GoDaddy Abuse * Google – Abuse Hub * Google Cloud Abuse * HostGator Abuse * Microsoft (Report Malware) * Microsoft (Report URL) * Microsoft CERT * OVH Abuse * SendGrid Abuse * Weebly Abuse ABOUT ME Embracing Technology, Protecting Others: My Journey in Cybersecurity Since the early 90s, my world has revolved around computers. It all started with a Packard Bell PC, diving into modem-based dial-up connections and stumbling upon my first hack—a program called ‘Navigator’ designed for child safety. Uncovering a critical combination, I crashed Navigator and accessed the computer’s desktop, igniting my passion for technology and exploration. Growing up, I faced challenges within my family, as my brother occasionally stole the money I earned from web design and local computer support. Determined to protect what was rightfully mine, I purchased a large home safe, symbolizing my commitment to fortify my defenses. Despite his attempts to undermine me, his efforts only scratched the surface. I even suggested installing a hallway camera to bolster security, shaping my strategic mindset and the principle of protecting others from exploitation. Throughout my career, I’ve maintained a balanced approach, embodying intensity, direction, and persistence to deliver consistent, high-quality service to every organization I work with. This dedication has led to self-concordance, job engagement, and an commitment to achieving goals. Over the past fifteen years, I’ve had the privilege of building, exploring, and developing security systems globally, likely safeguarding something that belongs to you along the way. My writing, enriched by interviews with late 90s hackers like John Vransevich (JP), Kent Browne (Hack Phreak), Carolyn Meinel (Happy Hacker), Eric Ginorio (Bronco Buster), Marc Maiffret (sn1per), Jodi Jones (Venomous), and Patrick Gregory (MostHated), reflects my deep involvement in hacker culture. Beginning in my youth, this journey included interactions with the FBI and Secret Service, where I was more an inquisitive explorer than an adversary. My goal has always been to safeguard information integrity and confidentiality, steering clear of deceit or harm. Contact me at the bottom of this page if you have any questions/comments about the blogs, or Follow me on LinkedIn. READ MORE CONTACT Your email address will not be published. Required fields are marked* Name* Email* Subject* Message* Δ * LinkedIn * Facebook * Twitter * Reddit * Email © 2018 INFOSTRUCTION. All Rights Reserved. Send this to a friend SendCancel