I’m Dr. Brigitte Lewis.

I’m glad you decided to drop in and check out what I’ve been up to.

I love all things tech, lesbian cultureriding my bike and penetration testing AKA ethical hacking

(including bad photoshopping and a good giggle).

This is the home of all my latest writing and projects.

I am the founder of W0m3nWhoHackM3lbourn3.

Featured Work

Penetrating Real-Time Threat Behaviour: Cyber Analytics and the Pen Tester

It’s the wild, wild west out there in cyberspace, except the feral camels[1] that once roamed Texas are the hackers, and they’re roaming beyond borders and through firewalls on the daily.

At present, cyber threat intelligence gathering is a mish-mash of intrusion detection system logs, port scans, IP addresses, information sharing platforms, Twitter feeds and traditional write-ups. There is no one consistent language used across these platforms to refer to attacks, techniques or procedures and there’s no one single source of data. Much like post-truth America, you’ve got to look in all the right places to piece together the whole story and even then it’s hard to know if you’ve put the puzzle together the way it was intended. What this means is while there’s massive complexity when trying to understand the path an attacker has taken, it also means that there’s huge potential when it comes to leveraging the data or bits (pun intended) of evidence a hacker leaves behind.

What The Actual (Fuck) is Blockchain?

The idea for blockchain came from a now germinal paper written in 2008 by the man known as Satoshi Nakamoto, what his or their real name is, no-one knows which just adds to the mystery and intrigue around the whole community.

Nakamoto referred to “blocks” and “chains” which has evolved into the now more common usage of blockchain. A blockchain is quite literally a chain of blocks tied together. A block as a single entity or data structure is made up of a numerical identifier starting from block number 1, a nonce which is an abbreviation for the term Number Only used oNCE, data such as, the amount being sent, the address being sent from and to, a signature, a time stamp and transactions fees.

What The Actual (Fuck) 

 is IoT?

From space, to transport, to the design of cities, IoT is the latest acronym to sweep the cyber landscape. IoT is short for Internet of Things and was coined by Kevin Ashton in 1999.  IoT is any device, be it your phone, laptop or Raspberry Pi that is connected to the internet. And so these devices come to be known as ‘things’, especially as more things like light globesfridgeswatchesTVs and vending machines are internet enabled. Depending on your position, this is either great for business or terrible for the human proclivity towards laziness because who wouldn’t want to turn their lights off from the comfort of bed right? Business and government are particularly keen on the Internet of Things and what it can potentially do in terms of increased productivity, efficiency and citizen engagement. But the take home from many of the sessions at Melbourne’s recent IoT Festival was that many people have no idea what IoT is or how it can impact them in positive ways.

Online harassment of LGBTI people: A Crime by Any Other Name

  Policymakers need to commit funding to studying online harassment of LGBTI people and how to respond to it. The Internet was once considered the domain of the unreal, a kind of pseudo-utopia where anything goes and anything can be said or posted, at least for...

It’s Hammertime: SQL Injection For Beginners

Oh hey! I presented at the Australian Information Security Association (AISA) Conference in 2019 with a presentation called SQL Injection for Beginners: It's Hammertime. Peeps asked for the slides so here they are as a YouTube experience with all the vids and giph's...