Latest Post
R&E #03: Gathering System Information (Host Enumeration)
Today’s post will be about host enumeration. It is a...
Read MoreLinux 101 #03: Linux Workflow (Cont)
A file descriptor (FD) in...
Read MoreLinux 101 #02: Linux Workflow
Let us start with the...
Read MoreLinux 101 #01: Meet Linux: What It Is, Where It Came From, and How It’s Built
Linux, as you might already...
Read MoreCPTS #07: Pivoting, Tunneling, and Port Forwarding
Metasploit could really help make this pivot easier to manage.
Read MoreCPTS #08: Active Directory Enumeration & Attacks
In Skill #1, we were provided with a web shell...
Read MoreCPTS #06: Attacking Common Services
Be careful — make sure to use -p- in your...
Read MoreCPTS #09: Attacking Common Applications
Using metasploit for quick exploit and Exploit-DB is a good...
Read MoreAFK #01: Dragon Symphony – Zyusouken
The first post in the “Away From Keyboard” section. Aside...
Read MoreAFK #03: Fondjoy The Batman 2022
Once again, I’m back with another Fondjoy figure. (Hmm, I’ve...
Read MoreAFK #02: Fondjoy Batman Tactical Suit
This is the first Batman figure I’ve ever purchased. So,...
Read More