Posts by category


Unknowndevice64 writeup

4 minute read

This is a short and fun machine available on VulnHub. The machine has no outdated, vulnerable software, but is set up as a fun CTF challenge with a few inten...

bWAPP writeup

5 minute read

bWAPP is a PHP application specifically designed to be exploited. It contains many bugs and vulnerabilities, and allows you to select the security level, sim...

Kuya 1 writeup

8 minute read

This is a relatively easy to crack machine. Let’s start with the basics: Reconnaissance.

Typhoon v1.02 writeup

10 minute read

This is a writeup for the Typhoon v1.02 machine on VulnHub. This is a highly vulnerable machine, with multiple potential entry points. There are four differe...

The five phases of ethical hacking

1 minute read

An Ethical Hacker is someone who specialises in computer security through what’s known as “Penetration Testing”, which are series of exercises carried out ag...

Post-Exploitation: spawning a shell

3 minute read

Once you have gained shell access on a machine, you will often find the prompt extremely limited, especially if you have used manual exploitation. In these c...

MSFVenom and Meterpreter: The basics

3 minute read

I just recently successfully gained root (or rather, Administrator, because it’s a Windows box) on the Devel machine in Hack The Box.

The fun begins:

1 minute read

It’s been a while since I joined Probably more than a year. And I haven’t really had the time to spend trying to break into the m...

Static analysis tools for Windows

2 minute read

I’m currently studying malware analysis, so I wanted to write a post on the tools I’ve been using recently, to serve as a reference for me and hopefully for ...

Back to top ↑


Back to top ↑