A collection of my research, thoughts, and study notes on cybersecurity.
Common attack paths and techniques for compromising Active Directory environments, including Kerberoasting and Pass the Hash.
Exploring the differences between Stored, Reflected, and DOM-based XSS, with code examples and mitigation strategies.
A checklist of common misconfigurations to look for when escalating privileges on a Linux system, from SUID binaries to cron jobs.
Using Wireshark to capture and analyze network packets, identifying protocols, and detecting suspicious activity.
An introduction to the tools and techniques used to decompile and understand the functionality of binary executables.
Identifying and exploiting common security flaws in cloud environments, such as public S3 buckets and overly permissive IAM roles.
Deconstructing phishing emails to identify malicious links, spoofed headers, and social engineering tactics.
Techniques for escalating privileges on Windows, including unquoted service paths, weak registry permissions, and DLL hijacking.
An overview of fundamental cryptographic concepts, including symmetric vs. asymmetric encryption, hashing, and digital signatures.