Dec 14, 20217 minExploiting log4j | Apache SolrLog4j is a popular Java library maintained by the Apache foundation used as a logging framework for Java. Around Friday 10th December...
Jan 16, 20223 min Post compromise analysis | Overpass 2In this write up, we will be playing the role of an incident responder, post compromise of a system. The task is to identify what the...
Jan 9, 20224 minHow to use Hydra to brute force login forms.Hydra is a very powerful and fast password cracking tool which can also perform dictionary attacks against a wide range of protocols such...
Dec 14, 20217 minExploiting log4j | Apache SolrLog4j is a popular Java library maintained by the Apache foundation used as a logging framework for Java. Around Friday 10th December...
Nov 18, 20214 minAttacktive DirectoryThis will be my first of many Active Directory themed blogs focused around exploitation. I have recently been exposed to a lot of Active...
Mar 22, 20216 minExploit development BOFBuffer Overflow This blog post is my attempt in trying to explain how to perform a buffer overflow in preparation for the OSCP. I have...