PinnedPublished inInfoSec Write-upsCybersecurity Roadmap For DummiesAs a self-taught Ethical Hacker with a profound passion for cybersecurity, I am pleased to offer a comprehensive roadmap based on my…Jul 27, 2023A response icon7Jul 27, 2023A response icon7
PinnedInsights on HTB CPTS: An Empowering Learning ExperienceHTB Certified Penetration Testing Specialist (HTB CPTS) is a highly hands-on certification that assesses the candidates’ penetration…Jun 16, 2023Jun 16, 2023
HTB x VL Lock: Formal Write-upSynopsis: The engagement of the HTB x VL box Lock began with the discovery of an open Gitea service on TCP port 3000.Aug 27Aug 27
HTB x VL Shibuya: Formal Write-upSynopsis: Shibuya, a challenging hard-rated HTB x Vulnlab Active Directory box.Aug 18Aug 18
HTB x VL RetroTwo: Formal Write-upThe RetroTwo machine, a Windows Server 2008 R 2 Domain Controller for the `retro2.vl` domain.Jun 25Jun 25
HTB x VL Professional Lab Puppet: Formal Write-upSynopsis: Puppet is designed for penetration testers and red teamers in search of a quick and challenging lab that has C2 infrastructure..May 21A response icon1May 21A response icon1
HTB x VL Retro: Formal Write-upSynopsis: The Retro machine from HTB x Vulnlab was a Windows Active Directory Domain Controller.May 11May 11
HTB x VL Build: Formal Write-upSynopsis: This write-up details the penetration test conducted against the HTB x Vulnlab Build machine.Apr 29Apr 29
Understanding BeyondCorp: Google’s Zero Trust Security ModelBeyondCorp is an enterprise security architecture that enables secure access to internal applications without using a traditional VPN.Apr 7Apr 7
Published inInfoSec Write-upsHTB POV: Formal Write-upSynopsis: POV, a medium machine on HackTheBox, was vulnerable to Local File Inclusion (LFI) through the “cv download” option.Feb 1Feb 1