PinnedPublished inInfoSec Write-upsCybersecurity Roadmap For DummiesAs a self-taught Ethical Hacker with a profound passion for cybersecurity, I am pleased to offer a comprehensive roadmap based on my…Jul 27, 20236Jul 27, 20236
PinnedInsights on HTB CPTS: An Empowering Learning ExperienceHTB Certified Penetration Testing Specialist (HTB CPTS) is a highly hands-on certification that assesses the candidates’ penetration…Jun 16, 2023Jun 16, 2023
Published inInfoSec Write-upsHTB POV: Formal WriteupSynopsis: POV, a medium machine on HackTheBox, was vulnerable to Local File Inclusion (LFI) through the “cv download” option.Feb 1Feb 1
HTB CozyHosting: Formal WriteupSynopsis: Cozy hosting is a project hosting service web app hosted on nginx 1.18.0.Apr 30, 2024Apr 30, 2024
HTB Keeper: Formal WriteupSynopsis: Keeper is a Linux easy machine that hosts the Request Ticket (RT 4.4.4) web application.Feb 14, 2024Feb 14, 2024
Insights on ISC2 CC Free Certification: Your Gateway to Cybersecurity SuccessFirst impression:The CC exam was pretty easy to me as I have a quite good basic and I have been on the cyber security industry for a while.Nov 4, 2023Nov 4, 2023
Demystifying Kubernetes: A Comprehensive Guide for Pentesters to Master the Fundamentals 1.1Kubernetes is a free and open-source technology for container orchestration (commonly referred to as “K8s”).Oct 23, 2023Oct 23, 2023
A Complete Guide to Making a Keylogger for Ethical UseIntroduction:A keylogger is a program that records keystrokes made on a target system. It can record crucial data like login credentials…Sep 23, 2023Sep 23, 2023
Published inSystem WeaknessKubernetes for Pentesters: Essential Terms Explained Part 1An open-source platform called Kubernetes automates the administration, scalability, and deployment of containerized applications. It is a…Sep 8, 2023Sep 8, 2023
Published inInfoSec Write-upsMonitorsTwo — HTB WriteupSynopsis: MonitorsTwo is an easy-to-hack Linux machine that is vulnerable to the CVE-2022–46169 vulnerability.Aug 30, 2023Aug 30, 2023