🔒 HTB: Pterodactyl Writeup
Detailed writeup of Season 10 Hack The Box Pterodactyl machine. 🔒 Protected Content
Hacking and Offensive Security Content.
Detailed writeup of Season 10 Hack The Box Pterodactyl machine. 🔒 Protected Content
CodePartTwo is an easy-difficulty Linux machine featuring a vulnerable JavaScript execution sandbox that can be escaped to gain initial access, followed by weak credential recovery and privilege escalation through backup utility manipulation.
Step-by-step guide for StellarComms, a medium Active Directory box on HackSmarter. We exploit DACL misconfigurations and perform advanced credential recovery.
Imagery is a medium-difficulty Linux box where blind XSS leads to admin access, file traversal leaks source code, command injection gains a shell, and a sudo-abused backup tool escalates to root.
My journey to earning the OSCP: How I scored 100 points in just 7 hours. This review covers my preparation, the exam environment, and crucial success tips.
Voleur is a medium-difficulty Active Directory machine featuring password-protected Excel files, targeted Kerberoasting via WriteSPN abuse, AD object restoration, DPAPI credential extraction, and privileged access through WSL-accessible domain backups.
A complete writeup of the HackSmarter 'Welcome' machine. Learn about Active Directory privilege escalation, PDF cracking, and ADCS certificate abuse.
Solutions for the API security challenges featured in the APISEC-CON CTF (May 2025). I cover broken object-level authorization and complex API vulnerability.
Reviewing the Burp Suite Certified Practitioner (BSCP) exam. Learn the best strategies for using Burp Suite Professional to pass this rigorous web cert exam.
Detailed write-up for two challenging web tasks from b01lersc CTF 2025. I break down the exploitation chain from discovery to obtaining the final flag easily.
Exploring the AI category in the HTB Cyber Apocalypse 2025 CTF. This write-up covers prompt injection and model manipulation challenges with step-by-step logic.
Comprehensive solutions for the Web challenges during the HTB Cyber Apocalypse 2025 CTF. Learn about modern web vulnerabilities and bypasses used in the event.
A detailed walkthrough of the APISEC CTF 2025, featuring the 'One Request to Rule Them All' challenge. Includes a full video guide and technical methodology.
A deep dive into the Hack The Box CBBH, now CWES certification. Explore my preparation strategy, exam difficulty review, and advice for aspiring web testers.
My comprehensive review of the SecOps Group CAPenX certification. I share my exam experience, study resources, and essential tips for passing on your first try.
Welcome to my cybersecurity blog! Join me as I document my journey through certifications, CTFs, and lab walkthroughs while sharing technical insights daily.