Members only Obsidian - Game Changing Learning Balancing a heavy workload means leaning hard on solid habits. One habit I’ve invested in over the years and stuck to is taking notes and building a personal knowledge base. I’ve take notes from books, from meetings, from quotes I've heard, and even take aways from
Hacking Signal and Noise According to conceptually.org, the general idea of signal and noise is defined simply as: The signal is the meaningful information that you’re actually trying to detect. The noise is the random, unwanted variation or fluctuation that interferes with the signal. In the context of security testing, this is
Hacking Persevere: Trust your Struggle Paradoxically, the man who has failed and one who is at the peak of success are in exactly the same position. Each must decide what he will do next, choose the course that will lead him to the future. - Jigoro Kano In 1970, Paul McCartney filed a lawsuit against
Time Management Probability of PWNd Don’t be so hard on yourself when things go badly and don’t be so proud of yourself when they go well. - Annie Dukes In the first part of our discussion on hacking in bets, we discussed that the more bets you can place (because you manage your
Reference Guns, Archery, and Pentesting After nearly 200 years of being king of the battlefield, in the early 1600s England and much of the Western world moved away from relying on the bow and arrow and transitioned to using guns. With hindsight, this seems like an obvious choice— until you actually look at the weaponry
Reference 10 Tech Books That Matter One of the questions I get frequently is about what I recommend for new learners to read. So, I started compiling a larger reading list that I will release shortly— but I thought I’d start with offering up the top 10 books that I believe have helped me throughout
Hacking Fear, Art, and Hacking A person’s license to create is irrevocable, and it opens to every corner of daily life. But it is always hard to see that doubt, fear, and indirectness are eternal aspects of the creative path - Shaun McNiff in ‘Trust the Process: An artist’s guide to letting go’
Time Management Time Hacking: The Scotty Principle Oh, You didn’t tell him how long it’d really take did ya? - Montgomery Scott To end this series about time management, we should discuss one last skill that I think security testers need to master. Guessing. Some, more professional sorts of folk, might call it ‘estimating’ but
Hacking Building your Studio I’ve never met a craftsman who wasn’t insanely particular about the way their workshop was setup. From luthiers who make classical instruments, to chefs setting up their kitchens—how you build out your studio matters. From the work areas, key equipment, to even the arrangement of storage, every
Time Management Hacking in Bets Life is poker, not chess - Annie Duke Security of an application/system isn’t a perfect information game. You are always playing with out a full picture of all the factors affecting the ‘security posture’ of any given system. If you were to factor in runtimes, shared libraries, server
Time Management Nothing will work unless you do Nothing will work unless you do - Coach John Wooden In the past article we talked about how processes, methods, and actions during an engagement are bets with time. Despite the relentless nature of time itself, it can be a dear friend or a bitter enemy. It is the great
Hacking Professional Rule Breaking The nature of this job is to break all of the rules, but not to break people’s trust. Supposedly descending from Germany, there is a card game called Mao with only two real rules: 1. You are forbidden to tell other players the rules. 2. Players are punished for
News Coming soon This is the new version of Sen Security. I am working to migrate over legacy posts, and I will work towards republishing things here. I have some new content ready to go, and in the meantime you can subscribe if you'd like to stay up to date and