Thomas HeverinFeb 252 minCertificate Transparency Logs for ReconnaissanceWe at Girls Learn Cyber (GLC) have been learning how to use certificate transparency logs for reconnaissance. Crt. sh is one of many...
Thomas HeverinNov 21, 20222 minShodan for Ethical Hacking: Five Tips in Five MinutesThis entry is the first of a series of blog entries in which we highlight a free ethical hacking tool within five minutes and provide...
Thomas HeverinNov 19, 20221 minThe Key to Keeping Keys SafeGirls Learn Cyber, Inc. (GLC) students conducted open source intelligence (OSINT) research on electronic key boxes via Shodan. In their...