Adversary attribution — Part-2Understanding threat classification, and adversary attribution techniques, avoiding common pitfalls etcMay 5May 5
Analyzing Advanced Cyber threats — Nation State Actors — Part 1While nation-state attacks are few, once an organization is targeted and breached by these, the impact is significantFeb 26Feb 26
CSP Lab Writeup — TryHackMeContent Security Policy helps add a last line of defense against XSS, and this goes briefly over concepts and writeup of TryHackMe roomNov 26, 2023Nov 26, 2023
Local Privilege escalation concepts — LinuxWhat is a mob to a king? What is a king to a god?Jan 24, 2023Jan 24, 2023
KerberoastingIn my last blog, I explained what kerberos is and how it works within the AD context. In this blog, we will explore a post-exploitation…Dec 24, 2022Dec 24, 2022
Introduction to KerberosUnderstanding Kerberos is an essential know how for an attacker or pentester targeting an AD environment. To understand this we would need…Dec 3, 20221Dec 3, 20221
Nebula (17–19) — Exploit EducationOutlying the nebula exploitation challenges which are centered around the concept of privilege escalation in LinuxAug 19, 2022Aug 19, 2022
Exploit Research — “The JMP ESP”Covering a buffer overflow with a restriction on characters but executable stackJul 24, 2022Jul 24, 2022
A brief introduction to exploit researchA brief introduction that goes over the basics of exploit research and a vanilla buffer overflow exploitJul 18, 2022Jul 18, 2022