PLC Web Server Arbitrary File Download
Introduction In this post I’ll go over a simple arbitrary file download vulnerability I found on the webserver of a commonly used PLC. To avoid disclosing t...
Introduction In this post I’ll go over a simple arbitrary file download vulnerability I found on the webserver of a commonly used PLC. To avoid disclosing t...
I’m starting this file as a tracking mechanism for courses I have completed and ones I am in the process of completing.
Links for the video posted on my youtube channel! Check it out. https://www.youtube.com/watch?v=F8zlx5d4UyA
TL;DR/Summary:
This box was made by my buddy @ChefByzen on Twitter, I know him from our Uni CTF team. Very cool box!
Thoughts Overall it seems to be a very well put together, useful, and informative.
TCM PEH (The Cyber Mentor Practical Ethical Hacking) Course Review!
Jeeves is in reference to a Jenkins server that we will eventually be exploiting. Super fun recap box!
Review I completed the Starting Point track from HackTheBox. It builds off of the principles that you learn in the Academy which I also finished. You can se...
Realized I had a file named “babuk_builder.zip” sitting on my computer that I haven’t messed with. Today’s the day! This isn’t the cutting edge of ransomwar...
Introduction The CVE in question is CVE-2021-21972.
In this post I’m going to go over customizations I’ve made to WSL to make my life easier.
Notes taken while going through the Pentester Academy x86 Assembly and Shellcoding on Linux Course. Not done with it yet. Publishing the assignments as I com...
The Security Operations Analyst Challenge was a great opportunity to learn about Microsoft’s solutions to endpoint and cloud security. Including but not limi...
Throughout the journey I will reference multiple sources and people to gain a better understanding of binary exploitation and reverse engineering at large.