<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Jared Folkins</title><link>https://www.jaredfolkins.com/</link><description>Recent content on Jared Folkins</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Tue, 16 Aug 2016 11:00:00 +0000</lastBuildDate><atom:link href="https://www.jaredfolkins.com/index.xml" rel="self" type="application/rss+xml"/><item><title>Plot.ly MathJax LaTeX Stored XSS</title><link>https://www.jaredfolkins.com/plotly-mathjax-latex-stored-xss/</link><pubDate>Tue, 16 Aug 2016 11:00:00 +0000</pubDate><guid>https://www.jaredfolkins.com/plotly-mathjax-latex-stored-xss/</guid><description>&lt;h2 id="summary"&gt;Summary&lt;/h2&gt;
&lt;p&gt;Plot.ly allowed user-controlled LaTeX content to be rendered through MathJax with JavaScript-capable hyperlink behavior enabled. A malicious plot author could create stored interactive content that executed JavaScript when another user interacted with a plot title or annotation.&lt;/p&gt;</description></item><item><title>Plotly.js SVG XSS and CSS Injection</title><link>https://www.jaredfolkins.com/plotlyjs-svg-xss-and-css-injection/</link><pubDate>Tue, 09 Aug 2016 23:39:56 +0000</pubDate><guid>https://www.jaredfolkins.com/plotlyjs-svg-xss-and-css-injection/</guid><description>&lt;h2 id="summary"&gt;Summary&lt;/h2&gt;
&lt;p&gt;Plotly.js returned malformed SVG markup from user-controlled plot fields. The rendered SVG allowed an attacker to inject executable behavior through link attributes and to trigger cross-domain resource loads through CSS.&lt;/p&gt;
&lt;h2 id="affected-surface"&gt;Affected Surface&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Product: Plot.ly / Plotly.js&lt;/li&gt;
&lt;li&gt;Component: SVG text rendering and sanitization&lt;/li&gt;
&lt;li&gt;Affected versions: Plotly.js before 1.16.0&lt;/li&gt;
&lt;li&gt;Vulnerability classes: stored XSS, CSS injection, external resource injection&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="impact"&gt;Impact&lt;/h2&gt;
&lt;p&gt;An attacker who could create or edit a plot could inject malicious SVG content that executed JavaScript in the Plot.ly web application when another user interacted with the plot. A second issue allowed remote image/resource loads, which could disclose viewer metadata and support user tracking.&lt;/p&gt;</description></item><item><title>Concrete5 ProBlog CSRF to Stored XSS</title><link>https://www.jaredfolkins.com/concrete5-problog-csrf-to-stored-xss/</link><pubDate>Mon, 23 May 2016 23:39:56 +0000</pubDate><guid>https://www.jaredfolkins.com/concrete5-problog-csrf-to-stored-xss/</guid><description>&lt;h2 id="summary"&gt;Summary&lt;/h2&gt;
&lt;p&gt;Concrete5 ProBlog accepted authenticated blog-create POST requests without validating an anti-CSRF token. The same workflow also trusted the supplied parent page ID, allowing a forged request to place attacker-controlled content outside the expected blog tree.&lt;/p&gt;</description></item><item><title>Concrete5 ProEvent SQL Injection to RCE</title><link>https://www.jaredfolkins.com/concrete5-proevent-sql-injection-to-rce/</link><pubDate>Thu, 14 Apr 2016 02:01:21 +0000</pubDate><guid>https://www.jaredfolkins.com/concrete5-proevent-sql-injection-to-rce/</guid><description>&lt;h2 id="summary"&gt;Summary&lt;/h2&gt;
&lt;p&gt;Concrete5 ProEvent exposed a SQL injection in calendar routes that passed unsanitized request parameters into the &lt;code&gt;eventIs()&lt;/code&gt; query builder. The issue could be chained from unauthenticated route access to database modification, administrator login, file upload changes, and remote code execution on a standard LAMP deployment.&lt;/p&gt;</description></item><item><title>Understanding When To Use Channels Or Mutexes In Go</title><link>https://www.jaredfolkins.com/understanding-when-to-use-channels-or-mutexes-in-go/</link><pubDate>Sat, 23 Jan 2016 03:37:09 +0000</pubDate><guid>https://www.jaredfolkins.com/understanding-when-to-use-channels-or-mutexes-in-go/</guid><description>&lt;h1 id="problem-domain"&gt;Problem Domain&lt;/h1&gt;
&lt;p&gt;&lt;strong&gt;Community&lt;/strong&gt; - &lt;em&gt;“Share Memory By Communicating”&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Interpretation&lt;/strong&gt; - &lt;em&gt;“CHANNEL ALL TEH THINGZ!”&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Because many developers come from backgrounds (Php, Ruby, Perl, Python) where unlike Go, concurrency is not a first class citizen, they struggle when learning about it. But they apply themselves and take the time to dig into Go’s concurrency model. And just as they finally feel they’ve come to grips, something painful happens. The developer decides to use their new found super-power (goroutines + channels) for absolutely everything and it suddenly becomes an anti-pattern.&lt;/p&gt;</description></item><item><title>How To: Shove data into Postgres using Goroutines and GoLang</title><link>https://www.jaredfolkins.com/how-to-shove-data-into-postgres-using-goroutinesgophers-and-golang/</link><pubDate>Tue, 29 Oct 2013 19:24:01 +0000</pubDate><guid>https://www.jaredfolkins.com/how-to-shove-data-into-postgres-using-goroutinesgophers-and-golang/</guid><description>&lt;p&gt;After watching Rob Pike’s wonderful golang talk, ‘Concurrency Is Not Parallelism’, in which he uses the analogy of having many Gophers running around and getting work done. I realized that I wanted to program a test so as better to solidify the concept.&lt;/p&gt;</description></item><item><title>Hacking Java Bytecode for Programmers (Part4) – Krakatau And The Case Of The Integer Overflow</title><link>https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part4-krakatau-and-the-case-of-the-integer-overflow/</link><pubDate>Tue, 25 Jun 2013 15:30:46 +0000</pubDate><guid>https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part4-krakatau-and-the-case-of-the-integer-overflow/</guid><description>&lt;h2 id="index"&gt;Index&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part1-the-birds-and-the-bees-of-hex-editing/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part1) - The Birds and the Bees of Hex Editing&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part2-lions-and-tiger-and-op-codes-oh-my/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part2) - Lions, and Tigers, and OP Codes, OH MY!&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part3-yes-disassemble-with-javap-all-over-the-place/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part3) - Yes, disassemble with Javap ALL OVER THE PLACE!&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part4-krakatau-and-the-case-of-the-integer-overflow/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part4) - Krakatau And The Case Of The Integer Overflow&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;A funny thing happened on the way to crafting my next blog post. I met this very talented twenty-one year old student who goes by the handle Storyyeller, on an online forum. He offered to help educate me on how to write bytecode by hand. How freaking pro.&lt;/p&gt;</description></item><item><title>Hacking Java Bytecode for Programmers (Part3) – Yes, disassemble with Javap ALL OVER THE PLACE!</title><link>https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part3-yes-disassemble-with-javap-all-over-the-place/</link><pubDate>Tue, 28 May 2013 21:50:30 +0000</pubDate><guid>https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part3-yes-disassemble-with-javap-all-over-the-place/</guid><description>&lt;h2 id="index"&gt;Index&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part1-the-birds-and-the-bees-of-hex-editing/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part1) - The Birds and the Bees of Hex Editing&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part2-lions-and-tiger-and-op-codes-oh-my/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part2) - Lions, and Tigers, and OP Codes, OH MY!&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part3-yes-disassemble-with-javap-all-over-the-place/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part3) - Yes, disassemble with Javap ALL OVER THE PLACE!&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part4-krakatau-and-the-case-of-the-integer-overflow/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part4) - Krakatau And The Case Of The Integer Overflow&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In &lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part2-lions-and-tiger-and-op-codes-oh-my/" target="_blank" rel="noopener"&gt;Part 2&lt;/a&gt;
, I showed you at a high level, what Java Opcodes are and I also walked you through how to manipulate Strings inside of the compiled code. I’ve actually used the exact method discussed in that post to bypass some sanity checks in a Java application I was reverse engineering.&lt;/p&gt;</description></item><item><title>Hacking Java Bytecode for Programmers (Part2) – Lions, and Tigers, and OP Codes, OH MY!</title><link>https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part2-lions-and-tiger-and-op-codes-oh-my/</link><pubDate>Fri, 17 May 2013 16:49:18 +0000</pubDate><guid>https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part2-lions-and-tiger-and-op-codes-oh-my/</guid><description>&lt;h2 id="index"&gt;Index&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part1-the-birds-and-the-bees-of-hex-editing/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part1) - The Birds and the Bees of Hex Editing&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part2-lions-and-tiger-and-op-codes-oh-my/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part2) - Lions, and Tigers, and OP Codes, OH MY!&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part3-yes-disassemble-with-javap-all-over-the-place/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part3) - Yes, disassemble with Javap ALL OVER THE PLACE!&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part4-krakatau-and-the-case-of-the-integer-overflow/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part4) - Krakatau And The Case Of The Integer Overflow&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In &lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part1-the-birds-and-the-bees-of-hex-editing/" target="_blank" rel="noopener"&gt;Part 1&lt;/a&gt;
, I showed you the basics of Hexadecimal, Hex Editors, and Java Bytecode. Refer to that post if you need to catch up. The following will be a simple exercise showing you how to manipulate the Java Bytecode directly.&lt;/p&gt;</description></item><item><title>Hacking Java Bytecode for Programmers (Part1) -The Birds and the Bees of Hex Editing</title><link>https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part1-the-birds-and-the-bees-of-hex-editing/</link><pubDate>Tue, 14 May 2013 17:24:17 +0000</pubDate><guid>https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part1-the-birds-and-the-bees-of-hex-editing/</guid><description>&lt;h2 id="index"&gt;Index&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part1-the-birds-and-the-bees-of-hex-editing/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part1) - The Birds and the Bees of Hex Editing&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part2-lions-and-tiger-and-op-codes-oh-my/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part2) - Lions, and Tigers, and OP Codes, OH MY!&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part3-yes-disassemble-with-javap-all-over-the-place/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part3) - Yes, disassemble with Javap ALL OVER THE PLACE!&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/hacking-java-bytecode-for-programmers-part4-krakatau-and-the-case-of-the-integer-overflow/" target="_blank" rel="noopener"&gt;Hacking Java Bytecode for Programmers (Part4) - Krakatau And The Case Of The Integer Overflow&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="tools--references"&gt;Tools &amp;amp; References&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Ubuntu 12.10&lt;/li&gt;
&lt;li&gt;Java 1.7.0_15&lt;/li&gt;
&lt;li&gt;Python 2.7&lt;/li&gt;
&lt;li&gt;xxd&lt;/li&gt;
&lt;li&gt;Bless Hex Editor&lt;/li&gt;
&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Java_bytecode" target="_blank" rel="noopener"&gt;http://en.wikipedia.org/wiki/Java_bytecode&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="http://en.wikipedia.org/wiki/Hexadecimal" target="_blank" rel="noopener"&gt;http://en.wikipedia.org/wiki/Hexadecimal&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="http://linuxcommand.org/man_pages/xxd1.html" target="_blank" rel="noopener"&gt;http://linuxcommand.org/man_pages/xxd1.html&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="audience"&gt;Audience&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Required: You should be comfortable in Linux ( 1+ years )&lt;/li&gt;
&lt;li&gt;Required: You should be comfortable writing scripts ( 1+ years )&lt;/li&gt;
&lt;li&gt;Desired: You have written web, desktop, or mobile applications ( 1+ years )&lt;/li&gt;
&lt;li&gt;Desired: You have programmed in Java and Python ( 6 months )&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="what-is-hexadecimal"&gt;What is Hexadecimal?&lt;/h2&gt;
&lt;p&gt;Computers execute binary code. But neck beards were fairly frustrated when editing a binary file and having to parse and edit huge number blocks of ones and zeros. The internet tells me that IBM came along and formalized a hexadecimal standard in the 1950s to pacify their geeks.&lt;/p&gt;</description></item><item><title>How to contribute to an open source project</title><link>https://www.jaredfolkins.com/how-to-contribute-to-an-open-source-project/</link><pubDate>Fri, 30 Nov 2012 19:56:55 +0000</pubDate><guid>https://www.jaredfolkins.com/how-to-contribute-to-an-open-source-project/</guid><description>&lt;p&gt;I understand. I really do. I get nervous too when thinking about submitting the “ifs” and the “elses” to an existing open source project. Finding the time and the courage to submit code to an open source project is still difficult for me. Here are some opinions of mine that I offer to you. Hopefully it will help you along.&lt;/p&gt;</description></item><item><title>How To: Install FreeTDS and UnixODBC On OSX Using Homebrew For Use With Ruby, Php, And Perl</title><link>https://www.jaredfolkins.com/how-to-install-freetds-and-unixodbc-on-osx-using-homebrew-for-use-with-ruby-php-and-perl/</link><pubDate>Tue, 10 Jan 2012 17:44:52 +0000</pubDate><guid>https://www.jaredfolkins.com/how-to-install-freetds-and-unixodbc-on-osx-using-homebrew-for-use-with-ruby-php-and-perl/</guid><description>&lt;p&gt;This little project started out as a basic script to connect to a Microsoft SqlServer and get data. It was a nightmare as I probably spent 15 hours learning about and troubleshooting both FreeTDS and UnixODBC. My pain is now your gain.&lt;/p&gt;</description></item><item><title>Newbs, Ruby, Profiling Memory Leaks Using Memprof, And Web Scraping with Mechanize</title><link>https://www.jaredfolkins.com/newbs-ruby-profiling-memory-leaks-using-memprof-and-web-scraping-with-mechanize/</link><pubDate>Mon, 08 Aug 2011 21:57:49 +0000</pubDate><guid>https://www.jaredfolkins.com/newbs-ruby-profiling-memory-leaks-using-memprof-and-web-scraping-with-mechanize/</guid><description>&lt;p&gt;So for the past four weeks in my spare time, I’ve been writing a sweet web scraping application for a personal research project. After overcoming the majority of regex and pattern matching challenges, I was finally able to get my spider a crawlin’ and then go to bed.&lt;/p&gt;</description></item><item><title>About</title><link>https://www.jaredfolkins.com/about/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.jaredfolkins.com/about/</guid><description>&lt;p&gt;Since the DotCom era Jared has worn many hats and is a full-stack talent in the purest sense. From architecting infrastructure with container recipes or hand crafting artisanal SQL, to programming applications or exploiting them, he loves it all. He is thankful to work with such a talented team and enjoys watching highly competent people do amazing things. When not nerding, he spends his time volunteering at his local Church to help free men from addiction. He does this alongside the love of his life Jaimi, while they work together to raise their meager brood of lovable kidlets.&lt;/p&gt;</description></item><item><title>Contact Me</title><link>https://www.jaredfolkins.com/contact/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.jaredfolkins.com/contact/</guid><description>&lt;p&gt;&lt;code&gt;jf``@``threathound``.``com&lt;/code&gt;&lt;/p&gt;</description></item><item><title>News</title><link>https://www.jaredfolkins.com/news/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.jaredfolkins.com/news/</guid><description/></item><item><title>Projects</title><link>https://www.jaredfolkins.com/projects/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://www.jaredfolkins.com/projects/</guid><description>&lt;h2 id="projects"&gt;Projects&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://llmon.dev/" target="_blank" rel="noopener"&gt;LLMon&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://wwaifu.dev/" target="_blank" rel="noopener"&gt;WWaifu&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://kushtaka.io" target="_blank" rel="noopener"&gt;Kushtaka&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.badactor.org" target="_blank" rel="noopener"&gt;BadActor&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://torhound.jaredfolkins.com" target="_blank" rel="noopener"&gt;TorHound&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/jaredfolkins/longstorm" target="_blank" rel="noopener"&gt;LongStorm&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://elevator.jaredfolkins.com" target="_blank" rel="noopener"&gt;Space Elevator&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/jaredfolkins" target="_blank" rel="noopener"&gt;GitHub&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="contributor"&gt;Contributor&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.holidayhackchallenge.com/2024/" target="_blank" rel="noopener"&gt;2024 KringleCon&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.holidayhackchallenge.com/2023/" target="_blank" rel="noopener"&gt;2023 KringleCon&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.holidayhackchallenge.com/2022/" target="_blank" rel="noopener"&gt;2022 KringleCon&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.holidayhackchallenge.com/2021/" target="_blank" rel="noopener"&gt;2021 KringleCon&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.wiley.com/en-us/Tribe&amp;#43;of&amp;#43;Hackers&amp;#43;Red&amp;#43;Team%3A&amp;#43;Tribal&amp;#43;Knowledge&amp;#43;from&amp;#43;the&amp;#43;Best&amp;#43;in&amp;#43;Offensive&amp;#43;Cybersecurity-p-9781119643326" target="_blank" rel="noopener"&gt;Tribe of Hackers: Red Team&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="gameboy"&gt;Gameboy&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/gameboy/vol1/" target="_blank" rel="noopener"&gt;2023 Gameboy Vol1&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/gameboy/vol2/" target="_blank" rel="noopener"&gt;2023 Gameboy Vol2&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.jaredfolkins.com/gameboy/vol3/" target="_blank" rel="noopener"&gt;2023 Gameboy Vol3&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="speaking"&gt;Speaking&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://youtu.be/pz65m6VaHzg?si=oWrGl0uA7N1ey7KE&amp;amp;t=1564" target="_blank" rel="noopener"&gt;Jared Folkins, KringleCon 2023&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=vIQY_FH1SVk" target="_blank" rel="noopener"&gt;Jared Folkins, DevOps Faux Paws | KringleCon 2022&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://youtu.be/wVEqpIHNOzE?si=E2zhEkdjEssOpdaE&amp;amp;t=2017" target="_blank" rel="noopener"&gt;Jared Folkins, KringleCon 2022&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=wxx-ocbqqwA" target="_blank" rel="noopener"&gt;Pwn School Nov. 2019: Defense through Deception&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="media"&gt;Media&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gettingintoinfosec.com/jared/" target="_blank" rel="noopener"&gt;Getting Into Infosec&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.detections.org/blog//2020/02/episode-11-otter-ways-of-detections.html" target="_blank" rel="noopener"&gt;Detections - Find Badness&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://brakeingsecurity.com/2020-013-part-2-education-security-ransomware-april-mardock-nathan-mcnulty-and-jared-folkins" target="_blank" rel="noopener"&gt;Brakeing Down Security&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.vice.com/en_us/article/59nzjz/teen-security-researcher-bill-demirkapi-suspended-for-exposing-vulnerabilities" target="_blank" rel="noopener"&gt;Vice.com&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;</description></item></channel></rss>