ROPEmporium: Ret2CSU Write-up In this post, I will be explaining my solution for the Ret2CSU challenge from ROPEmporium. The challenge can be found here: https://ropemporium.com/challenge/ret2csu.htmlROPEmporium challenges are awesome for learning Return
HackTheBox Write-up: Sizzle This is my write-up for the HackTheBox Machine named Sizzle. I have to give a large thanks to the creators of the machine who have put a lot of effort into it, and
12 Rules of Life and Principles for Success I decided to change up my blog posts a bit. This time, I wanted to talk about general life principles that I like to follow. Both of the following are self help books,
HackTheBox Write-up: RedCross This is my write-up for the HackTheBox Machine named RedCross. As usual, a large thanks to the creators of the machine who have put a lot of effort into it, and allowed me
HackTheBox Write-up: Vault This is my write-up for the HackTheBox Machine named Vault. I have to give a large thanks to the creators of the machine who have put a lot of effort into it, and
Overview of DMA attacks This post is inspired by @marcing, author of pentests.pl. Thanks for your presentation Marcin! DMA or Direct Memory Access attacks involve using hardware components to directly access a computer's RAM (Random Access
Ransomware, AES Encryption and Decryption using PowerShell I really enjoyed this year's SANS Holiday Hack (2018-19)! There were many great challenges, and many things to learn. My favourite challenge was a ransomware based challenge where we were asked to analyse
CySCA 2017 Corporate and IoT Challenges I had the privilege of testing the challenges written for CySCA 2017, and I thank the challenge creators for allowing me to test them and learn from them. Here, I will show my
KringleCon - SANS Holiday Hack 2018-19 The below PDF includes my write-up for last year's SANS Holiday Hack Massive thanks to the SANS team behind the challenges! I really enjoyed them! https://drive.google.com/file/d/1GcheenECfVQ9HYpnbBQkxv2lEOlCWwbF/view?
Credential Risk in a Windows Environment This article is about credential risk in a Windows Environment. The scenario is as follows: You are an Incident Responder or Level 1 Analyst trying to determine why a server is acting strangely,
LAN Turtle + Responder, how to defend The LAN turtle is a physical device sold by Hak5 that provides the user remote access to the network it is connected to. It comes with a female Ethernet port and a male