Posts by year

2019

Automating Proxmox with Ansible

4 minute read

Ansible is an automation platform for managing machines. When combined with Proxmox, it becomes a ridiculously powerful tool to orchestrate virtual datacente...

Unknowndevice64 writeup

4 minute read

This is a short and fun machine available on VulnHub. The machine has no outdated, vulnerable software, but is set up as a fun CTF challenge with a few inten...

bWAPP writeup

5 minute read

bWAPP is a PHP application specifically designed to be exploited. It contains many bugs and vulnerabilities, and allows you to select the security level, sim...

Kuya 1 writeup

8 minute read

This is a relatively easy to crack machine. Let’s start with the basics: Reconnaissance.

Typhoon v1.02 writeup

10 minute read

This is a writeup for the Typhoon v1.02 machine on VulnHub. This is a highly vulnerable machine, with multiple potential entry points. There are four differe...

The five phases of ethical hacking

1 minute read

An Ethical Hacker is someone who specialises in computer security through what’s known as “Penetration Testing”, which are series of exercises carried out ag...

Back to top ↑

2018

Post-Exploitation: spawning a shell

3 minute read

Once you have gained shell access on a machine, you will often find the prompt extremely limited, especially if you have used manual exploitation. In these c...

MSFVenom and Meterpreter: The basics

3 minute read

I just recently successfully gained root (or rather, Administrator, because it’s a Windows box) on the Devel machine in Hack The Box.

The DEFINITIVE guide to defeating spammers

6 minute read

Nowadays, spamming is a very common technique, and nobody can deny that. Spamming is so cheap that even a 10% opening rate is a tremendous success, because s...

The fun begins: HackTheBox.eu

1 minute read

It’s been a while since I joined https://www.hackthebox.eu/. Probably more than a year. And I haven’t really had the time to spend trying to break into the m...

Static analysis tools for Windows

2 minute read

I’m currently studying malware analysis, so I wanted to write a post on the tools I’ve been using recently, to serve as a reference for me and hopefully for ...

The power of silence

1 minute read

I find silence to be grossly underestimated. We live in an era of permanent distraction. Companies use loud, aggressive marketing in the form of advertisemen...

Productivity

17 minute read

In the past, I used to struggle with my productivity, no matter how hard I seemed to study, my grades didn’t reflect it. I was quite stubborn in believing I ...

My favourite Visual Studio Code extensions

2 minute read

At first, I really disliked Electron and JS-based text editors, like Atom and VSCode, but after learning Vim, and finding many problems with my plug-ins, on ...

Back to top ↑

2017

Why I use a MacBook

7 minute read

In this article, I want to explain why I use a MacBook. I am convinced it is the superior desktop OS, but I also think everyone should use what suits them. I...

Password managers

4 minute read

The Internet nowadays is a very messy place. Identity theft, e-mail confirmations, instant notifications, mobile devices, multiple accounts, data leaks, acco...

Hello world

less than 1 minute read

This is my first post.

Back to top ↑