Yes, it is real and he is a real person.

http://www.bucknerfanning.com/

I declined to explore any further because I really don’t want to know Buckner Fanning’s strategy of penetration.

  • manucode
    link
    fedilink
    129 hours ago
    1. Gather information on the target
    2. Analyze for vulnerabilities
    3. Exploite vulnerabilities
    4. Asses damage potential
    5. Report findings
    • @mlg
      link
      English
      39 hours ago

      [Insert MITRE ATT&CK framework here]

    • midori
      link
      2
      edit-2
      9 hours ago

      *6. Cry during the ten rounds of QA

  • @MissJinx
    link
    19 hours ago

    he looks like a blue team