Yes, it is real and he is a real person.

http://www.bucknerfanning.com/

I declined to explore any further because I really don’t want to know Buckner Fanning’s strategy of penetration.

  • manucode
    link
    fedilink
    arrow-up
    12
    ·
    3 hours ago
    1. Gather information on the target
    2. Analyze for vulnerabilities
    3. Exploite vulnerabilities
    4. Asses damage potential
    5. Report findings