githubEdit

Blog

The Journey of how I passed CISSPchevron-rightHow Nmap gets what OS is running by using different probeschevron-rightHow PsExec or similar tools operate over SMB to achieve remote command executionchevron-rightBeyond Session Hijacking: Using JavaScript Libraries for Comprehensive User Profiling Through XSSchevron-rightWhy does encoded message have a = or ==chevron-rightWhat Does "/bin/bash -p" Do?chevron-rightExtract username from private SSH keychevron-rightPurpose of Service Principal Names (SPN) in Active Directorychevron-rightGet Passwords from Teamviewer windows (No Metasploit)chevron-rightDifference between actively logged on users, locally logged on users and remotely logged userschevron-rightPacket Flow in RouterOSchevron-rightDepixelating information in the document (finding what was not supposed to be found)chevron-rightSpotting Spoofing Securing Your Email with DMARC, DKIM, and SPFchevron-rightStop Telling People to “Just Look at the URL”: You're Not That Specialchevron-right🧠NFS Isn’t Just File Sharing — It’s RPC in Disguisechevron-right😤I Had Write Permissions... So Why Was Linux Saying "No"?chevron-right🧠Post-Root Enlightenment: Why You Really Pwn Boxes — Thanks to IppSecchevron-rightFrom Chaos to Compliance A Smart Audit Logging Strategy for MariaDBchevron-rightSELinux: A Practical Guide for Real-World Linux Securitychevron-rightHow Certificate Transparency Logs Workchevron-rightI Lost My Automation Server: A Real-World Incident Response Lessonchevron-rightWhy SSH Says client_loop send disconnect Broken pipechevron-rightWhat Is a File Descriptor?chevron-rightReset Nessus Username & Password via CLIchevron-rightThe CNAME Paradox: Why Your Root Domain Can't Be an Aliaschevron-rightYour $150M Outage Started With One Wrong Assumption: Do You Even Know How to Talk During Incidents?chevron-rightPresence-Aware Infrastructure: My Lab Knows When I'm Home (and Saves Me $$$)chevron-rightFrom Curiosity to Backdoor: How I Found a Stealthy Persistence Technique in EC2 Instance Connectchevron-rightFrom Shadow IT to AI-Governed Infrastructurechevron-rightLeveraging Multiple Tor Exit Nodes for Data Exfiltration: A Containerized Approachchevron-rightAdaptive Percentage-Based Search: Finding ID Ranges Without Getting Blockedchevron-right

Last updated