The Dark LordAdversary attribution — Part-2Understanding threat classification, and adversary attribution techniques, avoiding common pitfalls etcMay 5May 5
The Dark LordAnalyzing Advanced Cyber threats — Nation State Actors — Part 1While nation-state attacks are few, once an organization is targeted and breached by these, the impact is significantFeb 26Feb 26
The Dark LordCSP Lab Writeup — TryHackMeContent Security Policy helps add a last line of defense against XSS, and this goes briefly over concepts and writeup of TryHackMe roomNov 26, 2023Nov 26, 2023
The Dark LordLocal Privilege escalation concepts — LinuxWhat is a mob to a king? What is a king to a god?Jan 24, 2023Jan 24, 2023
The Dark LordKerberoastingIn my last blog, I explained what kerberos is and how it works within the AD context. In this blog, we will explore a post-exploitation…Dec 24, 2022Dec 24, 2022
The Dark LordIntroduction to KerberosUnderstanding Kerberos is an essential know how for an attacker or pentester targeting an AD environment. To understand this we would need…Dec 3, 20221Dec 3, 20221
The Dark LordNebula (17–19) — Exploit EducationOutlying the nebula exploitation challenges which are centered around the concept of privilege escalation in LinuxAug 19, 2022Aug 19, 2022
The Dark LordExploit Research — “The JMP ESP”Covering a buffer overflow with a restriction on characters but executable stackJul 24, 2022Jul 24, 2022
The Dark LordA brief introduction to exploit researchA brief introduction that goes over the basics of exploit research and a vanilla buffer overflow exploitJul 18, 2022Jul 18, 2022