
Penetration Testing
A growing archive of my work in penetration testing — from lab environments to structured methodologies.
This is where I sharpen offensive skills to better understand real-world attack surfaces, privilege escalation, and exploitation logic.
-
Breaking in before the VPN broke down - A Journey through Precious (HTB Writeup)
A full walkthrough of the Hack The Box machine “Precious” — from enumeration to exploitation, including a clever pdfkit command injection and Ruby YAML deserialization for root. With shell stabilisation and some VPN drama on the side. -
HTB Reset: From Log Poisoning to Root. Exploiting Tmux, Rexec and Misconfigured Sudo
A deep-dive into escalating from LFI to full root via log poisoning, named pipe reverse shell, misconfigured sudo permissions, and forgotten tmux sessions. Includes analysis of R-services (rexec, rlogin, rsh) and real-world command chaining. -
A Small Prep Session: PortSwigger Beginner Labs
A short and focused session working through some beginner-level labs from PortSwigger, revisiting the fundamentals of web vulnerabilities like XSS, SQLi, and authentication bypasses. -
Uni Exam Practice VM practice: more of LFI2RCE
In this university exam practice VM, I explored file upload handling, discovered a separate file inclusion point, and chained it with an uploaded webshell to gain remote command execution. -
Test Exam: Penetration Testing Playbook
My personal playbook for my penetration testing test exam, covering all key steps from access via port forwarding to grabbing ALL 8 flags. -
Interview Prep Series: Part Two – Technical Deep Dive & Groundwork
Digging into technical fundamentals and real interview questions to sharpen my baseline as a pentester. Inspired by Steflan Security’s interview cheat sheet & my 2nd Cirosec Interview -
Interview Prep Series: Part One – Core Concepts & Confidence
Kicking off my interview prep journey with key phases of pentests, handling tricky questions, and building confidence under pressure. -
[+] Final Part: Active Directory Journay Day Five: Building, Securing, and Managing a Domain
Day Five covers key AD admin tasks - user and group creation, GPO management, and domain joins—using PowerShell with a security-focused approach. -
Active Directory Journey Day Four: Rights, Privileges, GPOs and a Whole Lot More
This post digs into Group Policy, Active Directory privileges, and built-in groups. I break down who has silent power, how attackers exploit User Rights, and what defenders can do to lock it down. Expect practical cheatsheets, tools, and battle-tested hardening tips. -
Active Directory Journey Day Three - All about Users & Groups
This post digs into Active Directory user accounts, local vs. domain context, and why SYSTEM access is a bigger deal than you think. You’ll learn where users live, how machines act like users, and how attackers use this to map, move, and mischief.