PinnedPublished inInfoSec Write-upsCybersecurity Roadmap For DummiesAs a self-taught Ethical Hacker with a profound passion for cybersecurity, I am pleased to offer a comprehensive roadmap based on my…Jul 27, 20236Jul 27, 20236
PinnedInsights on HTB CPTS: An Empowering Learning ExperienceHTB Certified Penetration Testing Specialist (HTB CPTS) is a highly hands-on certification that assesses the candidates’ penetration…Jun 16, 2023Jun 16, 2023
VL Build: Formal Write-upSynopsis: This write-up details the penetration test conducted against the Vulnlab Build machine.12h ago12h ago
Understanding BeyondCorp: Google’s Zero Trust Security ModelBeyondCorp is an enterprise security architecture that enables secure access to internal applications without using a traditional VPN.Apr 7Apr 7
Published inInfoSec Write-upsHTB POV: Formal WriteupSynopsis: POV, a medium machine on HackTheBox, was vulnerable to Local File Inclusion (LFI) through the “cv download” option.Feb 1Feb 1
HTB CozyHosting: Formal WriteupSynopsis: Cozy hosting is a project hosting service web app hosted on nginx 1.18.0.Apr 30, 2024Apr 30, 2024
HTB Keeper: Formal WriteupSynopsis: Keeper is a Linux easy machine that hosts the Request Ticket (RT 4.4.4) web application.Feb 14, 2024Feb 14, 2024
Insights on ISC2 CC Free Certification: Your Gateway to Cybersecurity SuccessFirst impression:The CC exam was pretty easy to me as I have a quite good basic and I have been on the cyber security industry for a while.Nov 4, 2023Nov 4, 2023
Demystifying Kubernetes: A Comprehensive Guide for Pentesters to Master the Fundamentals 1.1Kubernetes is a free and open-source technology for container orchestration (commonly referred to as “K8s”).Oct 23, 2023Oct 23, 2023
A Complete Guide to Making a Keylogger for Ethical UseIntroduction:A keylogger is a program that records keystrokes made on a target system. It can record crucial data like login credentials…Sep 23, 2023Sep 23, 2023