How Does a Reverse VPN actually work?

The Coolest Hacker Trick I’ve ever learned When I was just a pitiful script-kiddie, I spent hours watching Hak5 episodes. There was something so welcoming about Darren and Shannon explaining basic Linux skills. In this hak5 technolust episode, Darren does something that blew my mind. In the link in the last sentence, watch between 3:46 and 7:10 of the video. He describes a scenario where one of the client devices (in this case, a Lan Turtle) that connects to his vpn server is designated as a “vpn gateway” for all the other devices. ...

April 14, 2025 · 6 min

Understanding Log4j through Exploitation

Log4j It was December 9, 2021. I was working as a Vulnerability Management Consultant working for X-Force Red. Suddenly, it was all hands on deck. A new vulnerability had hit the scene and it was EXPLOSIVE. Log4j was a little logging library that java used and it was in EVERYTHING. All of our clients had it and they were worried. We spent weeks working with each of our POC’s (Point of Contact) and helping them identify their vulnerable machines. ...

January 22, 2025 · 2 min