top of page
Blog Posts

Dec 14, 20217 min read
Exploiting log4j | Apache Solr
Log4j is a popular Java library maintained by the Apache foundation used as a logging framework for Java. Around Friday 10th December...
7,858
0

Jan 16, 20223 min read
Post compromise analysis | Overpass 2
In this write up, we will be playing the role of an incident responder, post compromise of a system. The task is to identify what the...
103 views
0 comments

Jan 9, 20224 min read
Unleashing the Power of Hydra for Brute Force Login Attacks
Hydra is a very powerful and fast password cracking tool which can also perform dictionary attacks against a wide range of protocols such...
35,978 views
0 comments

Nov 28, 20214 min read
Exploiting EternalBlue | MS17-010
In this blog we will be walking though a machine from the Cybermentors course; Practical Ethical Hacking (PEH). The main lesson from this...
1,899 views
0 comments

Nov 18, 20214 min read
Attacktive Directory
This will be my first of many Active Directory themed blogs focused around exploitation. I have recently been exposed to a lot of Active...
780 views
0 comments

Nov 4, 20216 min read
Academy
This is my first blog post walking through a machine from the Cybermentors course Practical Ethical Hacking (PEH). This is one of the...
257 views
0 comments

Mar 22, 20216 min read
Exploit development BOF
Buffer Overflow This blog post is my attempt in trying to explain how to perform a buffer overflow in preparation for the OSCP. I have...
885 views
0 comments
bottom of page