Mar 16 · 3 min read · If you're doing Active Directory certificate attacks on HackTheBox, you've probably heard or used Certipy - the incredible tool by Oliver Lyak for PKI abuse. However, if you've tried installing it on
Join discussionFeb 26 · 5 min read · Security incidents rarely hinge on a single catastrophic bug. More often, they emerge from layered design shortcuts — each individually survivable, but collectively fatal. This case study examines a r
Join discussion
Feb 21 · 11 min read · 1. Footprinting Skill Assessment – Easy Walkthrough Scenario: We were commissioned to assess an internal DNS server belonging to Inlanefreight Ltd. The objective was to enumerate the system thoroughly
Join discussion
Jan 19 · 9 min read · Cryptography is one of the most important safeguards applied over any data. To make data unreadable for unintended people is a really complex task, since if the encryption is not complex enough, it could easily be reverse engineered back to plaintext...
Join discussion
Nov 21, 2025 · 2 min read · Initial Enumeration Performed an nmap scan to identify open ports and services: sudo nmap -sS -sV -T5 TARGET_IP Key findings: Port 22: OpenSSH 4.3 (protocol 2.0) Port 443: Apache httpd 2.2.3 (CentOS) running Elastix Port 10000: MiniServ 1.570 (W...
Join discussion