 
  
    
    
    
Post-Exploitation
- 
    HTB Reset: From Log Poisoning to Root. Exploiting Tmux, Rexec and Misconfigured SudoPosted on 9 mins A deep-dive into escalating from LFI to full root via log poisoning, named pipe reverse shell, misconfigured sudo permissions, and forgotten tmux sessions. Includes analysis of R-services (rexec, rlogin, rsh) and real-world command chaining.  
- 
    Test Exam: Penetration Testing PlaybookPosted on 8 mins My personal playbook for my penetration testing test exam, covering all key steps from access via port forwarding to grabbing ALL 8 flags.  
- 
    Active Directory Demystified: A Practical Learning Journey - Day 01Posted on 15 mins Active Directory powers most enterprise networks — and attackers love it. This guide simplifies AD with real-world analogies and attacker-focused insights to help you learn, enumerate, and exploit it effectively.  
- 
    From Basic to Blessed: Uplifting Your Webshell GamePosted on 9 mins From basic payloads to protected and self-destructing shells — a hands-on journey upgrading your webshells for stealth, power, and style.  
- 
    What I Do After the User Flag — My Beginner’s Priv Esc FlowPosted on 4 mins Getting user.txt is just the beginning. Here’s how I hunt for privilege escalation paths on Linux boxes — what I check, how I think, and why it still stumps me sometimes.