Personal Course Compendium (PCC)
I’m starting this file as a tracking mechanism for courses I have completed and ones I am in the process of completing.
I’m starting this file as a tracking mechanism for courses I have completed and ones I am in the process of completing.
TL;DR/Summary:
Thoughts Overall it seems to be a very well put together, useful, and informative.
TCM PEH (The Cyber Mentor Practical Ethical Hacking) Course Review!
Review I completed the Starting Point track from HackTheBox. It builds off of the principles that you learn in the Academy which I also finished. You can se...
Notes taken while going through the Pentester Academy x86 Assembly and Shellcoding on Linux Course. Not done with it yet. Publishing the assignments as I com...
The Security Operations Analyst Challenge was a great opportunity to learn about Microsoft’s solutions to endpoint and cloud security. Including but not limi...
Links for the video posted on my youtube channel! Check it out. https://www.youtube.com/watch?v=F8zlx5d4UyA
This box was made by my buddy @ChefByzen on Twitter, I know him from our Uni CTF team. Very cool box!
Jeeves is in reference to a Jenkins server that we will eventually be exploiting. Super fun recap box!
Review I completed the Starting Point track from HackTheBox. It builds off of the principles that you learn in the Academy which I also finished. You can se...
Throughout the journey I will reference multiple sources and people to gain a better understanding of binary exploitation and reverse engineering at large.
Thoughts Overall it seems to be a very well put together, useful, and informative.
Notes taken while going through the Pentester Academy x86 Assembly and Shellcoding on Linux Course. Not done with it yet. Publishing the assignments as I com...
Throughout the journey I will reference multiple sources and people to gain a better understanding of binary exploitation and reverse engineering at large.
This box was made by my buddy @ChefByzen on Twitter, I know him from our Uni CTF team. Very cool box!
In this post I’m going to go over customizations I’ve made to WSL to make my life easier.
Introduction In this post I’ll go over a simple arbitrary file download vulnerability I found on the webserver of a commonly used PLC. To avoid disclosing t...
Introduction The CVE in question is CVE-2021-21972.
This box was made by my buddy @ChefByzen on Twitter, I know him from our Uni CTF team. Very cool box!
Jeeves is in reference to a Jenkins server that we will eventually be exploiting. Super fun recap box!
Introduction In this post I’ll go over a simple arbitrary file download vulnerability I found on the webserver of a commonly used PLC. To avoid disclosing t...
I’m starting this file as a tracking mechanism for courses I have completed and ones I am in the process of completing.
TCM PEH (The Cyber Mentor Practical Ethical Hacking) Course Review!
Throughout the journey I will reference multiple sources and people to gain a better understanding of binary exploitation and reverse engineering at large.
The Security Operations Analyst Challenge was a great opportunity to learn about Microsoft’s solutions to endpoint and cloud security. Including but not limi...
In this post I’m going to go over customizations I’ve made to WSL to make my life easier.
Realized I had a file named “babuk_builder.zip” sitting on my computer that I haven’t messed with. Today’s the day! This isn’t the cutting edge of ransomwar...
Realized I had a file named “babuk_builder.zip” sitting on my computer that I haven’t messed with. Today’s the day! This isn’t the cutting edge of ransomwar...
Links for the video posted on my youtube channel! Check it out. https://www.youtube.com/watch?v=F8zlx5d4UyA