<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Breno Hildebrand</title>
    <link>https://brenohildebrand.com</link>
    <description>Writing on craft, code, and security.</description>
    <language>en-us</language>
    <atom:link href="https://brenohildebrand.com/rss.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>I Left an SSH Server Wide Open. Here&apos;s What Happened in 26 Seconds.</title>
      <link>https://brenohildebrand.com/posts/ssh-honeypot</link>
      <guid isPermaLink="true">https://brenohildebrand.com/posts/ssh-honeypot</guid>
      <description>I spun up a Firecracker VM with root/password123 exposed to the internet and watched. Three separate attackers found it within hours. The last one deployed a full malware toolkit in 26 seconds flat.</description>
      <pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>honeypot</category><category>ssh</category><category>malware</category><category>linux</category><category>networking</category>
    </item>
    <item>
      <title>I just passed the eJPT — here&apos;s what actually surprised me</title>
      <link>https://brenohildebrand.com/posts/ejpt-experience</link>
      <guid isPermaLink="true">https://brenohildebrand.com/posts/ejpt-experience</guid>
      <description>I didn&apos;t expect a certification exam to reframe how I think about pentesting. But it did — and the lesson had nothing to do with getting root.</description>
      <pubDate>Thu, 19 Mar 2026 00:00:00 GMT</pubDate>
      <category>security</category>
      <category>ejpt</category><category>certification</category><category>ine</category><category>pentesting</category><category>beginner</category>
    </item>
  </channel>
</rss>