 
  
    
    
    
Penetration-Testing
- 
    What I Learned from Bandit Wargames - Level 0-12 (And Why You Should Try It)Posted on 9 mins Learn practical Linux skills and command-line thinking through the first 12 levels of OverTheWire’s Bandit wargame. This post shares lessons, strategies, and powerful command-line tools (find, grep, awk, base64, tr, and more) without spoiling solutions; perfect for aspiring ethical hackers, CTF players, and curious beginners.  
- 
    What I Do After the User Flag — My Beginner’s Priv Esc FlowPosted on 4 mins Getting user.txt is just the beginning. Here’s how I hunt for privilege escalation paths on Linux boxes — what I check, how I think, and why it still stumps me sometimes.  
- 
    Introduction to Shells — essential knowledgePosted on 8 mins Understand what shells really are, how they evolved, why they matter, and how different types like reverse shells and webshells work.  
- 
    Pentesting 101 – Command Injection & Shell Tricks (Session 1 – Part 2)Posted on 5 mins After exploring XSS in Part 1, we now dive into server-side command injection, shell behavior, piping, and classic reverse shell tactics.
- 
    Basic Introduction to Penetration Testing – some basics & reflected XSS (Session 1 - Part 1)Posted on 11 mins Lab setup with Kali and Metasploitable 2, safe networking configuration, and a proper starting point for reflected XSS.