Hacking
Demonstrating offensive methodology through hands-on machine exploitation — from initial reconnaissance through privilege escalation to root.
Walkthroughs
Step-by-step breakdowns of Hack the Box machines — enumeration, exploitation, and privilege escalation documented for each target.
Late
Flask/Jinja2 SSTI exploitation through image-to-text converter. Injected Python subclass payloads to extract SSH keys, then escalated via writable ssh-alert.sh script to catch reverse shell as root.
Explore
Android device penetration testing with unusual open ports. Enumeration of non-standard services, credential discovery, and exploitation of Android debug bridge for system access.
CAP
IDOR vulnerability in network monitoring dashboard to access PCAP files containing plaintext credentials. FTP/SSH credential reuse, then Linux capabilities abuse for privilege escalation to root.
Previse
Bypassing access controls to create admin account, then exploiting OS command injection vulnerability. Password hash cracking and path hijacking for root.
Backdoor
GDB server exploitation via Metasploit to gain initial foothold, then privilege escalation by attaching to a root-owned GNU Screen session for full system access.