top of page
Blog Posts


Exploiting log4j | Apache Solr
Log4j is a popular Java library maintained by the Apache foundation used as a logging framework for Java. Around Friday 10th December...
Dec 14, 20217 min read


Post compromise analysis | Overpass 2
In this write up, we will be playing the role of an incident responder, post compromise of a system. The task is to identify what the...
Jan 16, 20223 min read


Unleashing the Power of Hydra for Brute Force Login Attacks
Hydra is a very powerful and fast password cracking tool which can also perform dictionary attacks against a wide range of protocols such...
Jan 9, 20224 min read


Exploiting EternalBlue | MS17-010
In this blog we will be walking though a machine from the Cybermentors course; Practical Ethical Hacking (PEH). The main lesson from this...
Nov 28, 20214 min read


Attacktive Directory
This will be my first of many Active Directory themed blogs focused around exploitation. I have recently been exposed to a lot of Active...
Nov 18, 20214 min read


Academy
This is my first blog post walking through a machine from the Cybermentors course Practical Ethical Hacking (PEH). This is one of the...
Nov 4, 20216 min read


Exploit development BOF
Buffer Overflow This blog post is my attempt in trying to explain how to perform a buffer overflow in preparation for the OSCP. I have...
Mar 22, 20216 min read
bottom of page