Active Directory AttacksIn this blog I will go through various techniques and strategies for attacking Active Directory environment. Topics like LLMNR poisoning…Jan 20Jan 20
Linux For HackersIn this article I tried to collect the most essential Linux commands that a penetration tester needs, to provide a comprehensive reference…Sep 18, 2023Sep 18, 2023
OSCP Survival NotesThis is a list with a lot of useful commands/notes for the OSCP. I will be updating the list continuously as I am progressing with the…Aug 5, 2023Aug 5, 2023
HTB Popcorn WalkthroughPopcorn is one of the easiest Linux boxes on the HackTheBox, it runs Torrent Hoster web app which is vulnerable to file upload, and the…Mar 28, 2021Mar 28, 2021
HTB Poison WalkthroughPoison is an interesting medium Linux box that runs a simple web page vulnerable to LFI, we utilize this security defect to leverage the…Mar 27, 2021Mar 27, 2021
HTB Passage WalkthroughWe bypass the Fail2Ban system by doing manual enumeration, to discover a CMS system named CuteNews version 2.1.2 which is vulnerable to…Dec 27, 2020Dec 27, 2020
Year Of The RabbitWe enumerate this machine using Nmap, and Gobuster to find an mp4 in the assets folder(Rabbit hole), then in the style.css file, we find…Dec 10, 2020Dec 10, 2020
HTB Cache WalkthroughCache is a medium Linux box that needs a lot of enumeration and it requires chaining multiple exploits together and cracking a hash to get…Sep 23, 2020Sep 23, 2020
HTB Magic WalkthroughSo I started my OSCP journey and I will be solving machines and documenting my solutions here. I will be doing a mix of active and retired…Aug 22, 2020Aug 22, 2020
HTB Traceback WalkthroughEasy Linux box, there is a message that’s telling us there is a PHP shell on the server, so we look for it and use it to get a foothold…Aug 14, 2020Aug 14, 2020