Cloud Security in 2025: Eight Critical Shifts Reshaping the Cybersecurity Landscape2025 is not the year to play catch-up. Brace yourself if you’re still handling cloud security as if it were an outdated firewall…Feb 4Feb 4
Deepfake Malware: An Unseen Cyber Enemy?The world of tech is growing, and it’s growing FAST. Just blink, and you’ll miss some new invention changing how we work, live, and, yes……Oct 7, 20241Oct 7, 20241
Inside My Cybersecurity Penetration StrategyPrinciples of Effective Penetration TestingJan 12, 2024Jan 12, 2024
HTB — Sauna(Write UP)Sauna is an easy-level Windows machine emphasizing Active Directory enumeration and exploitation. Usernames can be inferred from employee…Jan 10, 2024Jan 10, 2024
OFFSEC: PlanetExpress — Proving Grounds PracticePlanetExpress is a Linux machine with Easy difficulty. It is part of the Proving Grounds Practice. This machine is designed to test your…Jan 8, 2024Jan 8, 2024
OFFSEC: Resourced — Proving Grounds Practice (Writeup)“Resourced” operates as a machine within a Windows Active Directory (AD) environment. The initial access strategy involved utilizing an…Jan 7, 20244Jan 7, 20244
OFFSEC: Vault — Proving Grounds Practice(Writeup)“Vault” operates as a Windows-based system within an Active Directory environment. The initial foothold strategy involves two key actions…Jan 6, 202481Jan 6, 202481
RubyDome — PG PRACTICE(WRITEUP)This article provides an overview of a penetration test conducted on the RubyDome Project, specifically focusing on the HTML to PDF…Jan 3, 202414Jan 3, 202414
GLPI — PG PRACTICE (WRITEUP)Comprehensive Guide to GLPI Version 10.0.2 Enumeration with CVE-2022–35914 for Initial Foot Hold and Jetty XML RCE for Privilege…Jan 2, 20241Jan 2, 20241