PinnedHow I Stay Disciplined, Took Control of My Mind, and Keep Winning Through CybersecurityIn this post, I’m not going to talk about anything technical like hacking or cybersecurity. I’m simply going to speak my mind and share how…Jan 131Jan 131
Advanced Linux Privilege Escalation Techniques: MindmapPrivilege escalation in Linux systems is a critical phase in cybersecurity assessments, allowing attackers to elevate their access…Jul 16, 20241Jul 16, 20241
HackTheBox Machine Writeup — TabbyTabby is a easy difficulty Linux machine. Enumeration of the website reveals a second website that is hosted on the same server under a…Jul 10, 2024Jul 10, 2024
Teaching Cybersecurity by Hosting Mini-CTF (Capture the Flag) ChallengesI have been teaching undergraduate students the subject of cybersecurity at my university for some time now. To make the topics more…Jul 2, 2024Jul 2, 2024
Unlocking the Vault: Hunting for Credentials After Getting a Foothold in a CTFThere were moments when I gained a foothold in a Linux machine as a low-level user and ran LinPEAS along with all the other scans I could…Jun 27, 2024Jun 27, 2024
HackTheBox Machine Writeup — BrokerBroker is an easy difficulty `Linux` machine hosting a version of `Apache ActiveMQ`. Enumerating the version of `Apache ActiveMQ` shows…Jun 27, 2024Jun 27, 2024