HackTheBox presents “Valentine”, a vulnerable machine centered around OpenSSL’s well-known HeartBleed issue. This challenge pushes us to grapple with essential…
SweetRice CMS Exploitation | LazyAdmin TryHackMe
LazyAdmin is a machine available on TRYHACKME, designed for those looking to hone their skills in a controlled environment. This…
Exploiting Samba with Metasploit | HackTheBox
Lame is a beginner-friendly box available on HackTheBox. In this walkthrough, I’ll go through Nmap, SMB file shares, anonymous FTP…
OSINT For CTF
Passive Information Gathering in CTFs: A Deep Dive into Essential Tools and Techniques Introduction Passive information gathering is a vital…
Steganography and Hidden Data
Commands for Engagements
A cheat sheet selection of frequently utilized tools and commands for engagements. Consider it a reference guide to assist you…
Steganography for CTF
Using Steganography Tools in CTFs: Extracting Hidden Flags with Steghide Capture The Flag (CTF) competitions often require participants to solve…
Kerberoasting: An Offensive Playbook
Active Directory, a cornerstone of many networks, is riddled with complexities and nuances. It is these intricacies that give birth…
HSM Crash Course
A Hardware Security Module (HSM) is a tamper-resistant, security-hardened device used to ensure the integrity of cryptographic operations. HSMs generate,…