<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.stackattack.net/2023/09/07/dha-challenge-2023-09-skyfall/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2023/09/dha_2023-09_logo.png</image:loc><image:title>DHA_2023-09_Logo</image:title></image:image><lastmod>2023-09-07T12:31:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2023/09/07/dha-challenge-2023-06-solution/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2023/09/dha-2023-06-logo-solved.png</image:loc><image:title>dha-2023-06-logo-solved</image:title></image:image><lastmod>2023-09-07T12:29:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2023/08/02/dha-challenge-2023-08-billys-blobs/</loc><lastmod>2023-08-03T03:41:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2023/08/02/dha-challenge-2023-05-solution/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2023/08/dha-2023-05-logo-solved.png</image:loc><image:title>dha-2023-05-logo-solved</image:title></image:image><lastmod>2023-08-03T03:36:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2023/08/02/dha-challenge-2023-04-solution/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2023/08/dha-2023-04-solve-crossword.png</image:loc><image:title>dha-2023-04-solve-crossword</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2023/08/dha-2023-04-logo-solve.png</image:loc><image:title>dha-2023-04-logo-solve</image:title></image:image><lastmod>2023-08-02T05:29:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2023/08/01/dha-challenge-2023-07/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2023/08/dha-2023-07-logo-1.png</image:loc><image:title>dha-2023-07-logo</image:title></image:image><lastmod>2023-08-02T05:10:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2023/08/01/dha-challenge-2023-06/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2023/08/dha-2023-06-logo.png</image:loc><image:title>dha-2023-06-logo</image:title></image:image><lastmod>2023-08-02T05:10:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2023/08/01/dha-challenge-2023-05/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2023/08/dha-2023-05-logo.png</image:loc><image:title>dha-2023-05-logo</image:title></image:image><lastmod>2023-08-02T05:10:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2023/08/01/dha-challenge-2023-04/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2023/07/logo_header.png</image:loc><image:title>logo_header</image:title></image:image><lastmod>2023-08-02T05:09:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2023/01/04/dallas-hackers-association-2023-01-04/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2023/01/houdini-1.png</image:loc><image:title>houdini-1</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2023/01/houdini1-1-1094346986.jpg</image:loc><image:title>Houdini1-1-1094346986</image:title></image:image><lastmod>2023-08-01T04:52:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2022/10/08/jira-for-business-management/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2022/10/jira_header-1.png</image:loc><image:title>jira_header</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2022/10/jira_header.png</image:loc><image:title>jira_header</image:title></image:image><lastmod>2022-10-08T08:06:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2022/09/30/pha-challenges/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2022/09/pha_challenges.png</image:loc><image:title>pha_challenges</image:title></image:image><lastmod>2022-09-30T17:56:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2022/06/21/pwnagotchi-waveshare-v3/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2022/06/pwnagotchi_wavesharev3-1.jpg</image:loc><image:title>Pwnagotchi_WaveshareV3</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2022/06/pwnagotchi_wavesharev3.jpg</image:loc><image:title>Pwnagotchi_WaveshareV3</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2022/06/pwnagotchi_example.png</image:loc><image:title>pwnagotchi_example</image:title></image:image><lastmod>2022-09-30T17:55:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/challenges/</loc><lastmod>2022-05-17T18:31:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.stackattack.net/2022/03/09/custom-proxmox-ve-lxc-images/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2022/03/ctf-serve.png</image:loc><image:title>ctf-serve</image:title></image:image><lastmod>2022-03-10T05:37:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2022/02/13/hermits-hardware-hacking-box/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2022/02/pexels-photo-5767931.jpeg</image:loc><image:title>ladder with scotch in flat during renovation</image:title><image:caption>Photo by Ksenia Chernaya on &lt;a href="https://www.pexels.com/photo/ladder-with-scotch-in-flat-during-renovation-5767931/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-02-14T02:54:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2021/12/28/starting-the-2020-echallenge-coin-redux/</loc><lastmod>2021-12-28T17:42:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2021/12/11/closing-out-lightning-to-bitcoin/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2021/12/pexels-photo-730564.jpeg</image:loc><image:title>round silver and gold coins</image:title><image:caption>Photo by David McBee on &lt;a href="https://www.pexels.com/photo/round-silver-and-gold-coins-730564/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2021-12-11T18:33:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2021/05/13/bitcoin-node-lightning-network-tor/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2021/05/btc_lnd.png</image:loc><image:title>btc_lnd</image:title></image:image><lastmod>2025-11-20T18:35:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2021/05/12/long-time-gone/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2021/05/img_2448.jpg</image:loc><image:title>img_2448</image:title></image:image><lastmod>2021-05-13T02:58:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2020/05/22/quickhit-things-to-attack/</loc><lastmod>2020-05-22T21:03:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2020/05/19/intro-to-burpsuite/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2020/05/screen-shot-2020-05-18-at-11.44.30-pm.png</image:loc><image:title>Screen Shot 2020-05-18 at 11.44.30 PM</image:title></image:image><lastmod>2020-05-19T05:08:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2020/04/01/fire-talks-online-intro-to-woodworking/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2020/04/woodworking.jpg</image:loc><image:title>woodworking</image:title></image:image><lastmod>2020-04-02T00:30:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/09/23/derbycon-9-domaintools-ctf-reversing/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/09/scdbg_solution.png</image:loc><image:title>scdbg_solution</image:title></image:image><lastmod>2019-09-23T07:10:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/09/17/derbycon-9-domaintools-ctf-forensics/</loc><lastmod>2019-09-18T02:40:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/09/16/derbycon-9-domaintools-ctf-crypto/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/09/dt_ctf_logo.png</image:loc><image:title>dt_ctf_logo</image:title></image:image><lastmod>2019-09-17T04:50:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/09/14/derbycon-9-trustedsec-challenge-coin-solution/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/09/derbycon9_tsec_challenge_recipe.png</image:loc><image:title>DerbyCon9_TSEC_Challenge_Recipe</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/09/drby9_tsec_front.jpg</image:loc><image:title>DRBY9_TSEC_Front</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/09/drby9_tsec_back.jpg</image:loc><image:title>DRBY9_TSEC_Back</image:title></image:image><lastmod>2019-09-15T01:43:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/06/10/analyzing-multiple-apks-at-once/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/06/screenshot-from-2019-06-10-10-13-02.png</image:loc><image:title>Screenshot from 2019-06-10 10-13-02</image:title></image:image><lastmod>2019-06-10T15:13:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/06/05/fixing-firmware-file-systems/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/06/screenshot-from-2019-06-05-11-27-22.png</image:loc><image:title>FW-Mess</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/06/screenshot-from-2019-06-05-11-26-20.png</image:loc><image:title>Firmware</image:title></image:image><lastmod>2019-06-05T16:34:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/03/14/quick-hit-base64-powershell-exfiltration/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/03/powershell_exfil.png</image:loc><image:title>powershell_exfil</image:title></image:image><lastmod>2019-03-14T21:46:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/02/12/quick-hit-am-i-inside-a-docker-container/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/02/docker.png</image:loc><image:title>docker</image:title></image:image><lastmod>2019-02-12T15:44:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/02/08/quick-hit-editing-submissions-in-burpsuite/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/02/qh-bsedit_hexchange.png</image:loc><image:title>QH-BSEdit_HexChange</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/02/qh-bsedit_nonstdcharsinserted.png</image:loc><image:title>QH-BSEdit_NonStdCharsInserted</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/02/qh-bsedit_finalforsubmission.png</image:loc><image:title>QH-BSEdit_FinalForSubmission</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/02/qh-bsedit_add-xxd.png</image:loc><image:title>QH-BSEdit_Add-xxd</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/02/qh-bsedit_findtext.png</image:loc><image:title>QH-BSEdit_FindText</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/02/qh-bsedit_grepforchars.png</image:loc><image:title>QH-BSEdit_GrepForChars</image:title></image:image><lastmod>2019-02-08T17:01:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/01/31/gpg4win-kleopatra-for-windows/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/01/kleopatra.png</image:loc><image:title>kleopatra</image:title></image:image><lastmod>2019-01-31T20:54:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/01/28/quick-hits-screen/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/01/screen-help.png</image:loc><image:title>Screen Linux</image:title></image:image><lastmod>2019-01-28T20:51:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/01/14/windows-and-linux-base64-encode-decode-commands/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/01/base64.png</image:loc><image:title>base64</image:title></image:image><lastmod>2019-01-15T02:14:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2019/01/09/how-to-install-wget-on-windows/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2019/01/wget_logo.png</image:loc><image:title>wget_logo</image:title></image:image><lastmod>2019-01-10T03:00:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/12/26/proxmark3-rdv-4/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/12/pm3-rdv4.png</image:loc><image:title>pm3-rdv4</image:title></image:image><lastmod>2018-12-29T16:26:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/11/27/quick-tip-linux-and-rufus/</loc><lastmod>2018-11-27T16:22:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/11/02/a-primer-on-social-engineering/</loc><lastmod>2018-11-02T17:39:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/10/22/the-osi-model-pro-edition/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/10/supe-bulge-2jpg1.jpeg</image:loc><image:title>supe-bulge-2jpg</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/10/supe-bulge-2jpg.jpeg</image:loc><image:title>supe-bulge-2jpg</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/10/osi-model-header.png</image:loc><image:title>osi-model-header</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/10/matryoshka_russian_politicians.jpg</image:loc><image:title>Matryoshka_Russian_politicians</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/10/osi_model_pro.png</image:loc><image:title>osi_model_pro</image:title></image:image><lastmod>2018-10-25T19:25:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/10/25/gif-pronounciation-the-real-one/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/10/images.jpg</image:loc><image:title>images</image:title></image:image><lastmod>2025-06-16T11:43:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/10/25/gif-pronounciation/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/10/jif_1970s.png</image:loc><image:title>Jif_1970s</image:title></image:image><lastmod>2018-10-25T19:03:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/10/17/wireless-hacking/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/10/wireless-hack.png</image:loc><image:title>wireless-hack</image:title></image:image><lastmod>2018-10-18T03:44:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/10/03/the-four-three-rule-of-team-pentesting/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/10/fourthree.jpg</image:loc><image:title>FourThree</image:title></image:image><lastmod>2018-10-03T05:25:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/10/02/rfid-fundamentals/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/10/rfid-badges.jpg</image:loc><image:title>RFID Badges</image:title></image:image><lastmod>2018-10-03T04:10:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/09/20/getting-started-with-the-hackrf/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/qspecans.png</image:loc><image:title>qspecans</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/fobtransmit.png</image:loc><image:title>fobtransmit</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/signal_analysis.png</image:loc><image:title>signal_analysis</image:title></image:image><lastmod>2018-09-20T07:09:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/09/02/defcon-26-badge-photos/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/img_20180813_111058.jpg</image:loc><image:title>IMG_20180813_111058</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/img_20180902_003209.jpg</image:loc><image:title>IMG_20180902_003209</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/img_20180902_003157.jpg</image:loc><image:title>IMG_20180902_003157</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/img_20180902_002756.jpg</image:loc><image:title>IMG_20180902_002756</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/img_20180902_002810.jpg</image:loc><image:title>IMG_20180902_002810</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/img_20180902_002619.jpg</image:loc><image:title>IMG_20180902_002619</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/img_20180902_002632.jpg</image:loc><image:title>IMG_20180902_002632</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/img_20180902_002114.jpg</image:loc><image:title>IMG_20180902_002114</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/img_20180902_002101.jpg</image:loc><image:title>IMG_20180902_002101</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/09/img_20180902_001747.jpg</image:loc><image:title>IMG_20180902_001747</image:title></image:image><lastmod>2018-09-02T16:45:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/07/22/backpack-pentesting/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/07/backpack.png</image:loc><image:title>backpack</image:title></image:image><lastmod>2018-08-05T04:20:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/07/21/chuck-lumley/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/07/chuck.png</image:loc><image:title>chuck</image:title></image:image><lastmod>2018-07-21T07:07:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/07/20/quickhit-wget-website-mirroring/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/07/site-mirror.png</image:loc><image:title>site-mirror</image:title></image:image><lastmod>2018-07-21T06:07:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/07/18/tilfh-intro-to-things-i-learned-from-hermit/</loc><lastmod>2025-02-05T04:29:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/07/17/tilfh-quotes-and-when-to-use-them/</loc><lastmod>2018-07-17T14:12:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2016/12/14/quick-php-injector/</loc><lastmod>2018-07-10T04:49:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/05/23/search-engines/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2017/05/search-engine.jpg</image:loc><image:title>search-engine</image:title></image:image><lastmod>2018-07-10T04:40:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/04/29/osint-twitter-and-facebook/</loc><lastmod>2018-07-10T04:38:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/05/23/osint-google-and-linkedin/</loc><lastmod>2018-07-10T04:37:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/04/06/osint-dns/</loc><lastmod>2018-07-10T04:36:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/03/20/msf-fundamentals-2017-part-3-of-3-pivoting-and-automation/</loc><lastmod>2018-07-10T04:35:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/02/14/msf-fundamentals-2017-part-2-of-3-exploitation-and-post-exploitation/</loc><lastmod>2018-07-10T04:35:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/02/06/msf-fundamentals-2017-part-1-of-3-console-to-payload/</loc><lastmod>2018-07-10T04:34:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/01/16/wireless-attack-wpa/</loc><lastmod>2018-07-10T04:33:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/01/04/reversing-binary-on-command-line/</loc><lastmod>2018-07-10T04:33:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2016/10/01/metasploit-fundamentals-1-of-5-metasploit-overview-and-tools/</loc><lastmod>2018-07-10T04:32:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2016/10/03/metasploit-fundamentals-2-of-5-the-metasploit-console/</loc><lastmod>2018-07-10T04:32:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2016/10/06/metasploit-fundamentals-3-of-5-pivoting-with-metasploit/</loc><lastmod>2018-07-10T04:32:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2016/10/06/metasploit-fundamentals-4-of-5-metasploit-dynamic-shellcode-generation/</loc><lastmod>2018-07-10T04:31:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2016/12/23/wireless-attack-wep/</loc><lastmod>2018-07-10T04:31:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/07/08/introduction-to-hardware-protocols/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/07/i2c.png</image:loc><image:title>i2c</image:title></image:image><lastmod>2018-07-08T08:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/reading-room/</loc><lastmod>2018-07-03T01:33:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.stackattack.net/2018/07/02/random-characters/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/07/ascii-chars.png</image:loc><image:title>ascii-chars</image:title></image:image><lastmod>2018-07-03T01:28:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/06/20/quick-ascii-binary-tools/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/06/binary-ascii.png</image:loc><image:title>binary-ascii</image:title></image:image><lastmod>2018-06-20T05:55:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/06/20/getting-started-with-digispark/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/06/ds-connect-board.png</image:loc><image:title>ds-connect-board</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/06/ds-upload.png</image:loc><image:title>ds-upload</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/06/ds-install-option.png</image:loc><image:title>ds-install-option</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/06/ds-select-ds-board.png</image:loc><image:title>ds-select-ds-board</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/06/ds-select-board-manager.png</image:loc><image:title>ds-select-board-manager</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/06/ds-post-install.png</image:loc><image:title>ds-post-install</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/06/img_20180619_235428.jpg</image:loc><image:title>Maker:0x4c,Date:2017-9-26,Ver:4,Lens:Kan03,Act:Lar01,E-Y</image:title><image:caption>Maker:0x4c,Date:2017-9-26,Ver:4,Lens:Kan03,Act:Lar01,E-Y</image:caption></image:image><lastmod>2022-12-20T12:03:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/06/03/firmware-analysis/</loc><lastmod>2018-05-25T05:49:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/06/23/intro-to-cryptography-part-1-of-3/</loc><lastmod>2018-05-25T05:48:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/07/17/intro-to-cryptography-part-2-of-3/</loc><lastmod>2018-05-25T05:48:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/08/16/intro-to-cryptography-part-3-of-3/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2017/08/training_top.png</image:loc><image:title>training_top</image:title></image:image><lastmod>2018-05-25T05:47:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/05/24/multi-os-boot-build/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/05/e2b-booted-linux.png</image:loc><image:title>e2b-booted-linux</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/05/e2b-booted.png</image:loc><image:title>e2b-booted</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/05/rpmprep-qemu.png</image:loc><image:title>rpmprep-qemu</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/05/rpmprep-results.png</image:loc><image:title>rpmprep-results</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/05/rpmprep-make-contig.png</image:loc><image:title>rpmprep-make-contig</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/05/rpmprep-ui.png</image:loc><image:title>rpmprep-ui</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/05/rpmprep-run-post-install.png</image:loc><image:title>rpmprep-run-post-install</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/05/e2b-move-isos.png</image:loc><image:title>e2b-move-isos</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/05/e2b-contig-final-step.png</image:loc><image:title>e2b-contig-final-step</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/05/e2b-confirm-final-config-write.png</image:loc><image:title>e2b-confirm-final-config-write</image:title></image:image><lastmod>2018-05-25T05:34:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/05/12/benedict-slade/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2018/05/benedict_slade.png</image:loc><image:title>benedict_slade</image:title></image:image><lastmod>2018-05-25T05:33:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/02/04/tp-link-tg-3468-and-vmware-esxi-6-5/</loc><lastmod>2018-05-25T05:30:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/05/12/ctf-tools/</loc><lastmod>2018-05-12T14:57:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/virtual-soc/</loc><lastmod>2018-02-01T17:30:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.stackattack.net/about/</loc><lastmod>2018-02-01T17:28:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.stackattack.net/2017/09/07/protocol-deep-dive-arp/</loc><lastmod>2018-02-01T16:34:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2018/01/03/pentest-aliases-and-setup/</loc><lastmod>2018-02-01T16:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/contact/</loc><lastmod>2018-01-31T22:28:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.stackattack.net/2017/08/22/identifying-jtag/</loc><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2017/08/xilinx-parallel-iii-iv-9-pin.png</image:loc><image:title>XILINX-PARALLEL-III-IV-9-PIN</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2017/08/mips-philips.png</image:loc><image:title>MIPS-PHILIPS</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2017/08/motorola-powerpc-bdm.png</image:loc><image:title>MOTOROLA-POWERPC-BDM</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2017/08/mips-toshiba.png</image:loc><image:title>MIPS-TOSHIBA</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2017/08/pld.png</image:loc><image:title>PLD</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2017/08/lattice-9pin.png</image:loc><image:title>LATTICE-9PIN</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2017/08/linksys-wrt54.png</image:loc><image:title>LINKSYS-WRT54</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2017/08/maxq.png</image:loc><image:title>MAXQ</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2017/08/mips-ejtag.png</image:loc><image:title>MIPS-EJTAG</image:title></image:image><image:image><image:loc>https://blog.stackattack.net/wp-content/uploads/2017/08/bosch-edc16-bdm.png</image:loc><image:title>BOSCH-EDC16-BDM</image:title></image:image><lastmod>2017-08-23T03:17:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/07/10/rfi-php-webshell-injector/</loc><lastmod>2017-07-10T13:58:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/rules-for-life/</loc><lastmod>2017-06-19T06:26:41+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.stackattack.net/2017/04/29/bruteforcing-essid-values/</loc><lastmod>2017-04-29T21:49:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/04/06/email-attachments/</loc><lastmod>2017-04-06T17:43:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/02/21/advanced-wep-packet-forgery/</loc><lastmod>2017-02-21T13:25:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/02/16/windows-system-wiping/</loc><lastmod>2017-02-16T13:50:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/02/16/linux-login-notifier/</loc><lastmod>2017-02-16T05:00:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/01/19/wpa-handshake-stripping/</loc><lastmod>2017-01-19T06:18:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/01/19/wpa-handshake-verification/</loc><lastmod>2017-01-19T06:11:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/01/07/pass-the-hash-for-command-line-msf-and-rdp/</loc><lastmod>2017-01-08T03:45:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net/2017/01/07/installing-crackmapexec-cme/</loc><lastmod>2017-01-08T02:39:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.stackattack.net</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-11-20T18:35:38+00:00</lastmod></url></urlset>
