The Dark LordAdversary attribution — Part-2Understanding threat classification, and adversary attribution techniques, avoiding common pitfalls etc8 min read·6 days ago----
The Dark LordAnalyzing Advanced Cyber threats — Nation State Actors — Part 1While nation-state attacks are few, once an organization is targeted and breached by these, the impact is significant16 min read·Feb 26, 2024----
The Dark LordCSP Lab Writeup — TryHackMeContent Security Policy helps add a last line of defense against XSS, and this goes briefly over concepts and writeup of TryHackMe room10 min read·Nov 26, 2023----
The Dark LordLocal Privilege escalation concepts — LinuxWhat is a mob to a king? What is a king to a god?10 min read·Jan 24, 2023----
The Dark LordKerberoastingIn my last blog, I explained what kerberos is and how it works within the AD context. In this blog, we will explore a post-exploitation…6 min read·Dec 24, 2022----
The Dark LordIntroduction to KerberosUnderstanding Kerberos is an essential know how for an attacker or pentester targeting an AD environment. To understand this we would need…5 min read·Dec 3, 2022--1--1
The Dark LordNebula (17–19) — Exploit EducationOutlying the nebula exploitation challenges which are centered around the concept of privilege escalation in Linux10 min read·Aug 19, 2022----
The Dark LordExploit Research — “The JMP ESP”Covering a buffer overflow with a restriction on characters but executable stack3 min read·Jul 24, 2022----
The Dark LordA brief introduction to exploit researchA brief introduction that goes over the basics of exploit research and a vanilla buffer overflow exploit8 min read·Jul 18, 2022----