staging2.blog.infostruction.com Open in urlscan Pro
35.212.50.41  Public Scan

URL: https://staging2.blog.infostruction.com/
Submission: On April 05 via api from US — Scanned from US

Form analysis 2 forms found in the DOM

GET https://staging2.blog.infostruction.com/

<form role="search" method="get" class="search-form" action="https://staging2.blog.infostruction.com/">
  <label for="search-form-1">
    <span class="screen-reader-text"> Search for: </span>
  </label>
  <input type="search" id="search-form-1" class="search-field" placeholder="Search …" value="" name="s">
  <button type="submit" class="search-submit"><svg class="icon icon-search" aria-hidden="true" role="img">
      <use xlink:href="#icon-search"></use>
    </svg><span class="screen-reader-text"> Search </span></button>
</form>

POST /#wpcf7-f1985-p1941-o1

<form action="/#wpcf7-f1985-p1941-o1" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="1985">
    <input type="hidden" name="_wpcf7_version" value="5.9.3">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f1985-p1941-o1">
    <input type="hidden" name="_wpcf7_container_post" value="1941">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
  </div>
  <div class="form_wrap" id="contact">
    <p class="note">Your email address will not be published. Required fields are marked* </p>
    <div class="first_wrap">
      <p><label>Name<span>*</span></label><br>
        <span class="wpcf7-form-control-wrap" data-name="your-name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" value="" type="text" name="your-name"></span>
      </p>
      <p><label>Email<span>*</span></label><br>
        <span class="wpcf7-form-control-wrap" data-name="your-email"><input size="40" class="wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email" aria-required="true" aria-invalid="false" value=""
            type="email" name="your-email"></span>
      </p>
      <p><label>Subject<span>*</span></label><br>
        <span class="wpcf7-form-control-wrap" data-name="your-subject"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" value="" type="text" name="your-subject"></span>
      </p>
    </div>
    <div class="last_wrap">
      <p><label>Message<span>*</span></label><br>
        <span class="wpcf7-form-control-wrap" data-name="your-message"><textarea cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required" aria-required="true" aria-invalid="false"
            name="your-message"></textarea></span>
      </p>
      <p><input class="wpcf7-form-control wpcf7-submit has-spinner send" id="send" type="submit" value="SUBMIT"><span class="wpcf7-spinner"></span>
      </p>
    </div>
  </div>
  <p style="display: none !important;" class="akismet-fields-container" data-prefix="_wpcf7_ak_"><label>Δ<textarea name="_wpcf7_ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1"
      name="_wpcf7_ak_js" value="1712355707977">
    <script>
      document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
  <input type="hidden" name="KIjgq_QM" value="Ry@nkbfGCM0o1QPu"><input type="hidden" name="ElAPermvkutX" value="7eOgXr"><input type="hidden" name="dAxO_-uZ" value="Dc86km"><input type="hidden" name="sEIVLRYT" value="fzL_raJF">
</form>

Text Content

Skip to content
Menu
 * Home
 * About
 * Contact

Scroll down to content

Select
LanguageAfrikaansAlbanianArabicArmenianAzerbaijaniBasqueBelarusianBulgarianCatalanChinese
(Simplified)Chinese
(Traditional)CroatianCzechDanishDutchEnglishEstonianFilipinoFinnishFrenchGalicianGeorgianGermanGreekHaitian
CreoleHebrewHindiHungarianIcelandicIndonesianIrishItalianJapaneseKoreanLatvianLithuanianMacedonianMalayMalteseNorwegianPersianPolishPortugueseRomanianRussianSerbianSlovakSlovenianSpanishSwahiliSwedishThaiTurkishUkrainianUrduVietnameseWelshYiddish

BLOG FOR IT PROFESSIONALS, HACKERS AND STUDENTS OF CYBER SECURITY


BEHIND THE SCREENS: MY EXPERIENCE AT DIAMOND IT

Posted by Infostruction on March 30, 2024
 * March 30, 2024
 * No Comments

TL; DR: Navigating Challenges at Diamond IT: A Call for Change Starting my
Project Engineer (Sr. Professional Services Engineer) job at Diamond IT
(Bakersfield, CA) was fraught with issues, from needing login credentials for my
workstation to dealing with outdated and malfunctioning equipment. My optimism
for a structured training phase quickly faded as I encountered …

...

READ MORE


EVOLVING TOGETHER: FOSTERING A CULTURE OF SHARED WISDOM

 * February 12, 2024
 * No Comments

Our journey into the hidden struggles of customer support and the nuanced
dynamics of workplace culture has brought us to a pivotal point: the challenge
of sharing knowledge within our teams and organization. This is akin to
unveiling the workings behind the “Wizard of Oz” — it’s not just about the
individual behind the curtain but the collective effort sustaining the magic of
Oz. We’re moving the spotlight from solo victories to the synergy of shared
wisdom that lifts ...
READ MORE


MIMICKING MALICE: EXPLORING MALICIOUS TRAFFIC DISTRIBUTORS

 * January 27, 2024
 * No Comments

My journey into the depths of this blog began unexpectedly during a routine
online exploration, where I stumbled upon a cyber threat. This scenario is
common in our field, and other detailed analyses have been ongoing on groups
like ‘Parrot TDS‘ and ‘Vextrio.’ as they continue shifting the tactics and
techniques around these campaigns. These blog explorations often lead to
discoveries that resonate with those of other researchers, given the vast data
points they have to ...
READ MORE


CRAFTING CULTURE: THE BALANCE OF EGO, BIAS, BELIEFS

 * December 21, 2023
 * No Comments

My tech career went global early in terms of clientele, starting before I was
legally allowed to drink. It’s been a dynamic path, guided by more than 30
managers in various industries, including managed services, manufacturing, and a
large cybersecurity company. In my experience, I’ve noticed how a lack of
self-awareness and differing values and beliefs can profoundly affect workplace
behavior. These elements are crucial in shaping everyday interactions, conflict
resolution strategie...
READ MORE


INTERNAL BATTLES: UNSUNG HEROES OF CUSTOMER SUPPORT

 * November 16, 2023
 * No Comments

In customer support, the true challenge often lies within: a constant battle for
necessary internal help. These struggles have deepened my understanding of
effective support throughout my career and driven me to develop better systems.
They’ve empowered me to support colleagues who face similar internal obstacles
and to be a voice holding others accountable for providing the necessary
assistance. This journey has been about more than just overcoming hurdles; it’s
been about improving...
READ MORE


THE CALL-FIRST CONUNDRUM: RETHINKING TECH SUPPORT EFFICIENCY

 * November 09, 2023
 * No Comments

  It’s a familiar scene for many of us dealing with tech support: you hit a snag
with a service, you put in the effort to explain it all in a support ticket, and
then you wait, expecting that someone will take it from there. Instead, you get
asked to set up a phone call. Aligning schedules for this call can stretch the
whole process by days or weeks. When you finally get on the line, you often
repeat the information you’ve already given. If your ticket gets stuck with
someone ou...
READ MORE


BEYOND ASSUMPTIONS: SAILING TOWARD CUSTOMER-CENTRICITY

 * August 27, 2023
 * No Comments

Leaving assumptions behind, we've embarked on a journey of validation, customer
engagement, and iterative growth as the compass to success. Join us in a new era
of crafting experiences that truly resonate with customers. Anchored in
insights, fueled by innovation....
READ MORE


EGO’S VEIL: UNMASKING PERFORMATIVE ADVOCACY

 * August 22, 2023
 * No Comments

One day, during a brief lunch break from work, I stood in line at a local
restaurant, craving a sandwich to refuel for the rest of the day. As I waited, a
colleague approached me. Although we didn’t know each other well, they
recognized me from the office and discussed ‘Cyber Patriot.’ This was a
well-known competition where industry mentors teamed up with students to tackle
hacking challenges. I had heard of it and engaged in the conversation, nodding
in agreement and mentioni...
READ MORE


FINDING GOOD VENDORS: LESSONS FROM DENTAL CHAIRS

 * August 21, 2023
 * No Comments

Relocating to California brought about more than just a change in scenery; it
posed an unexpected challenge—finding a reliable dentist. What may seem like an
unrelated experience holds a profound analogy for understanding why customers
meticulously choose vendors, especially when they have dozens and hundreds of
others circling them at all times, like sharks in a competitive sea. Join me as
I share my dental journey and how it illuminates the pitfalls of hasty vendor
decisions. Dentist Analogy...
READ MORE


PRIVACY POWERHOUSES: OPTERY, KANARY, DELETEME, AND ONEREP

 * August 12, 2023
 * No Comments

Unmasking Data Detox Tools The term “Data Detox Tools” encompasses software
applications and online services tailored to assist individuals in managing and
overseeing their digital footprint and personal data across the expansive realm
of the internet. In this context, the term “detox” metaphorically parallels the
concept of purification, suggesting a process akin to eliminating unnecessary or
potentially detrimental elements. In the digital sphere, a data detox entails
t...
READ MORE


THE ENIGMATIC WORLD OF KEVIN MITNICK: STORIES OF HACKING AND REDEMPTION

 * July 19, 2023
 * No Comments

  Once upon a time, in the mid-90s, I was drawn into a world of hackers and
cybersecurity experts, seeking knowledge and inspiration. Among the names that
echoed through our circles was that of Kevin Mitnick, a legendary figure revered
for his audacious exploits and unmatched hacking prowess. Kevin’s stories were
the stuff of legends, like how he managed to hack into the source code of
cellphone towers, a feat that left us all in awe. But what truly amazed me was
his daring act of mon...
READ MORE


INSTAGRAM ACCOUNT RECOVERY

 * November 29, 2021
 * No Comments

Is Instagram’s account recovery workflow disappearing on some accounts and
devices? We’ve had reports from readers and friends who’ve had hacked Instagrams
with no success in using Instagram’s published docs to recover the account once
the attacker’s email and phone number have changed. Here’s a copy of the
official Instagram post: I think my Instagram has been hacked. (Update 12/6 –
After testing for weeks over 40 times we can see the option on an Andro...
READ MORE


CARD FRAUD – EXPRESS STORE 2401

 * November 27, 2021
 * 9

*** Update 9/12/22 *** – Thousands of people are visiting this blog regularly
due to card fraud of their own via Express Store 2401. I have not been able to
gather any more information from the companies involved, but I continue to dig
deeper into how they’re stealing these cards and other parts of the operation.
It’s ridiculous that it’s been going on this long and that Wells Fargo isn’t
concerned with somebody stealing a card that’s never been used.   &...
READ MORE


GOOGLE SPAMDEXING ATTACK

 * May 08, 2021
 * No Comments

Found an interesting Google Results injection against sites running Solr search.
Attackers created links in an unknown place with search parameters being passed
to the websites. Google crawled these source pages, following the links and
accepting them as content. It’s not all that sophisticated, but remember, it’s
results that matter in this game. Many more are on my Twitter from notifying the
organizations of this clever little hack against Google’s results. 911: Google
Webmas...
READ MORE


PHISH GALLERY & BLOG UPDATE

 * October 28, 2020
 * No Comments

A collection of phishing screenshots I've collected this year from various
honeypots and other sources. We've worked with many organizations over the years
to take down infrastructure related to these attacks. The trend I've seen across
security products is that they block effectively, but it takes time. Secondly,
the sites and email sources tend to go largely unreported.  If you want to make
a difference: Protect future victims by sending the abuse emails....
READ MORE
VIEW ALL


SEARCH

Search for: Search


FIXFINDER – SELF-HELP AUTOMATION



Ad: FixFinder - Self-Help Automation platform that lowers your Tier-1 volume
using a user empowering Desktop interface. FixFinder hooks into your existing
MSP and IT tools to provide Unified Knowledge, Custom Wizards, Status Pages,
Full Ticketing, and an Application library. Check it out!


SECURITY LINKS

 * Annoying Blog
 * Any.Run
 * AT&T Blog
 * Attrition
 * Avanan
 * Bark
 * Beta News
 * Bruce Schneier
 * Bugtraq
 * Children Of The Night
 * CISA Alerts
 * Cisco Talos
 * Compassion
 * ComputerWorld
 * Daniel Miessler
 * DeepSentinel
 * DNSFilter
 * DShield
 * Electronic Frontier Foundation
 * Exploit Database
 * FixFinder
 * Folding@Home
 * GBHackers
 * Graham Cluley
 * Hybrid Analysis
 * Internet Storm Center
 * IT Security Guru
 * JoeSandBox
 * KrebsOnSecurity
 * Microsoft Security Blog
 * National Vulnerability Database
 * Packet Storm
 * Palo Alto Networks Blog
 * Privacy Paradox
 * Project Safe Childhood
 * Project Zero
 * Qualys
 * Reddit NetSec
 * SANS Blog
 * SANS Reading Room
 * Security Boulevard
 * Security Weekly
 * Sensors Tech Forum
 * SentinelOne
 * SourceFire Blog
 * Sqreen
 * Stay Safe Online
 * TAO Security
 * Thorn
 * Threatpost
 * Troy Hunt
 * Unit 42
 * Virus Bulletin
 * VirusTotal
 * We Live Security
 * Wired
 * Zero Day


WHO’S ONLINE

Visits Today : 225 Visits Yesterday : 287 This Month : 1403 Total Visits :
529530 Who's Online : 1

Your IP Address: 38.132.118.75


WEB ABUSE REPORTS

 * Amazon AWS Abuse
 * Chrome – Malware URL
 * Chrome – Report Phishing
 * Cloudflare Abuse
 * Dreamhost Abuse
 * Gmail Abuse
 * GoDaddy Abuse
 * Google – Abuse Hub
 * Google Cloud Abuse
 * HostGator Abuse
 * Microsoft (Report Malware)
 * Microsoft (Report URL)
 * Microsoft CERT
 * OVH Abuse
 * SendGrid Abuse
 * Weebly Abuse




ABOUT ME

Embracing Technology, Protecting Others: My Journey in Cybersecurity

Since the early 90s, my world has revolved around computers. It all started with
a Packard Bell PC, diving into modem-based dial-up connections and stumbling
upon my first hack—a program called ‘Navigator’ designed for child safety.
Uncovering a critical combination, I crashed Navigator and accessed the
computer’s desktop, igniting my passion for technology and exploration.

Growing up, I faced challenges within my family, as my brother occasionally
stole the money I earned from web design and local computer support. Determined
to protect what was rightfully mine, I purchased a large home safe, symbolizing
my commitment to fortify my defenses. Despite his attempts to undermine me, his
efforts only scratched the surface. I even suggested installing a hallway camera
to bolster security, shaping my strategic mindset and the principle of
protecting others from exploitation.

Throughout my career, I’ve maintained a balanced approach, embodying intensity,
direction, and persistence to deliver consistent, high-quality service to every
organization I work with. This dedication has led to self-concordance, job
engagement, and an commitment to achieving goals. Over the past fifteen years,
I’ve had the privilege of building, exploring, and developing security systems
globally, likely safeguarding something that belongs to you along the way.

My writing, enriched by interviews with late 90s hackers like John Vransevich
(JP), Kent Browne (Hack Phreak), Carolyn Meinel (Happy Hacker), Eric Ginorio
(Bronco Buster), Marc Maiffret (sn1per), Jodi Jones (Venomous), and Patrick
Gregory (MostHated), reflects my deep involvement in hacker culture. Beginning
in my youth, this journey included interactions with the FBI and Secret Service,
where I was more an inquisitive explorer than an adversary. My goal has always
been to safeguard information integrity and confidentiality, steering clear of
deceit or harm.

Contact me at the bottom of this page if you have any questions/comments about
the blogs, or Follow me on LinkedIn.

READ MORE


CONTACT

Your email address will not be published. Required fields are marked*

Name*


Email*


Subject*


Message*




Δ


 * LinkedIn
 * Facebook
 * Twitter
 * Reddit
 * Email

© 2018 INFOSTRUCTION. All Rights Reserved.


Send this to a friend
SendCancel