Yes, it is real and he is a real person.

http://www.bucknerfanning.com/

I declined to explore any further because I really don’t want to know Buckner Fanning’s strategy of penetration.

  • manucode
    link
    fedilink
    183 months ago
    1. Gather information on the target
    2. Analyze for vulnerabilities
    3. Exploite vulnerabilities
    4. Asses damage potential
    5. Report findings
    • @mlg
      link
      English
      33 months ago

      [Insert MITRE ATT&CK framework here]

    • midori
      link
      2
      edit-2
      3 months ago

      *6. Cry during the ten rounds of QA