<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://pipefish.me/about-2/</loc><lastmod>2016-04-21T17:25:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pipefish.me/rando/</loc><lastmod>2016-04-01T13:51:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pipefish.me/2015/11/25/check-your-logs-you-may-be-an-attack-platform/</loc><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/11/screenshot_dns_arecord1.png</image:loc><image:title>screenshot_dns_arecord</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/11/screenshot_xss_1.png</image:loc><image:title>screenshot_xss_1</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/11/screenshot_dns_arecord.png</image:loc><image:title>screenshot_dns_arecord</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/11/capture2.jpg</image:loc><image:title>Capture2</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/11/capture1.jpg</image:loc><image:title>Capture1</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/11/capture.jpg</image:loc><image:title>Capture</image:title></image:image><lastmod>2015-12-01T18:38:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2011/03/31/captive-audience-using-iptables-and-php-as-a-home-grown-captive-portal-during-penetration-tests-2/</loc><lastmod>2015-10-06T12:44:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2010/11/02/add-a-user-with-root-privileges-non-interactively/</loc><lastmod>2015-10-06T12:39:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2011/04/07/incident-response-script/</loc><lastmod>2015-10-05T19:47:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2012/03/29/richsec-mitm-captive-portal-demo/</loc><lastmod>2015-10-05T19:40:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2012/04/30/dont-wait-and-dont-click/</loc><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/10/badverizon.jpg</image:loc><image:title>badverizon</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/10/mal2.jpg</image:loc><image:title>mal2</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/10/jscriptmal.jpg</image:loc><image:title>jscriptmal</image:title></image:image><lastmod>2015-10-05T19:39:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2012/08/28/spying-on-screens-and-keystrokes-the-dangers-of-open-x11/</loc><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/10/xwatchwin.png</image:loc><image:title>xwatchwin</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/10/xspy.png</image:loc><image:title>xspy</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/10/wininfo1.png</image:loc><image:title>wininfo1</image:title></image:image><lastmod>2015-10-05T19:34:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2012/09/17/automate_nessus/</loc><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/10/xmlrpc_nessus_2.png</image:loc><image:title>xmlrpc_nessus_2</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/10/xmlrpc_nessus_1.png</image:loc><image:title>xmlrpc_nessus_1</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/10/xml_rpc_nessus31.png</image:loc><image:title>xml_rpc_nessus31</image:title></image:image><lastmod>2015-10-05T19:29:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2014/01/06/kali-on-aws/</loc><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/10/kali_ec21.png</image:loc><image:title>kali_ec21</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/10/instance_params.png</image:loc><image:title>instance_params</image:title></image:image><image:image><image:loc>https://pipefish.me/wp-content/uploads/2015/10/import2ece2.png</image:loc><image:title>import2ece2</image:title></image:image><lastmod>2015-10-05T19:26:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2010/07/09/security-testingfully-patched-machine-compromise-with-mitmiframe-injection/</loc><lastmod>2015-10-05T18:51:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2012/04/04/m-screencap-application-for-troubleshooting-and-sleuthy-spying/</loc><lastmod>2015-10-05T18:34:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2012/04/05/remote-pentest-setup-multiple-default-gateways/</loc><lastmod>2015-10-05T18:33:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2012/12/20/use-execustom-with-psexec-scanner/</loc><lastmod>2015-10-05T18:27:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2015/07/11/offensive-it-security-tactics-course-description/</loc><lastmod>2015-07-11T13:47:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2015/06/06/rv4sec-2015-ctf-final-scores/</loc><lastmod>2015-06-06T01:17:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2014/05/17/full-disk-encrypted-kali-aws-ec2-instance/</loc><lastmod>2014-05-17T18:26:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2012/05/17/richsec-april-meeting-intro-to-iptables/</loc><lastmod>2012-05-17T12:36:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2012/05/15/track-your-cpes-from-security-constraining/</loc><lastmod>2012-11-23T19:51:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2012/05/14/two-wrongs-make-a-right/</loc><lastmod>2012-05-14T23:47:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2012/04/25/mobile-malware-via-a-fax/</loc><lastmod>2012-04-28T17:49:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/scripts/</loc><lastmod>2012-04-21T01:54:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pipefish.me/tools/</loc><lastmod>2012-04-20T20:22:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pipefish.me/blog/</loc><lastmod>2012-04-11T00:43:41+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://pipefish.me/2012/04/09/home-network-users-be-ware-2/</loc><lastmod>2012-04-09T18:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2010/11/08/passed-the-offensive-security-oscp-exam/</loc><lastmod>2011-04-19T10:53:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2010/08/25/microsoft-and-others-dll-load-hijacking-bug-remote-exploit-possible/</loc><lastmod>2010-08-25T13:30:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2010/08/12/analyze-malware-in-the-time-it-takes-to-grab-a-cup-of-coffee/</loc><lastmod>2010-08-17T09:32:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2010/08/10/the-perfect-storm-a-story-of-snort-false-positive-verification/</loc><lastmod>2010-08-10T17:56:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2010/07/27/shellcode-assembly-and-buffer-overflow/</loc><lastmod>2011-02-21T17:44:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2010/07/21/metasploit-module-released-for-latest-windows-0-day/</loc><lastmod>2010-07-21T17:55:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2010/07/20/offensive-security-penetration-testing-with-backtrack-pwb3/</loc><lastmod>2010-09-13T09:43:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2010/01/28/vmware-releases-new-vsphere-hardening-guides/</loc><lastmod>2010-01-28T22:09:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2009/06/14/virtualization-pros-cons-and-security/</loc><lastmod>2009-06-14T19:59:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me/2009/05/25/data-at-rest-encryption/</loc><lastmod>2009-05-25T20:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://pipefish.me</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2016-04-21T17:25:21+00:00</lastmod></url></urlset>
