Skip to main content

· 5 min read

Problems using Metasploit on MacOS

I use a MacBook Pro (M2) in a professional context and a MacBook Pro (2019, Intel) in a personal context, and I have consistently encountered the issue that reverse shells from Metasploit handlers were not caught on both devices. In this article, I describe how I analyzed the problem, narrowed it down, and found a solution that works for my purposes.

· 3 min read

Lazy Admin CTF Write-Up

This document provides a comprehensive write-up of the Lazy Admin room on TryHackMe, highlighting a methodical approach to penetration testing within a controlled environment. The challenge is tagged as easy and focuses on exploiting common vulnerabilities found in web applications and misconfigurations within Unix systems.

· 4 min read

Solving the Mustacchio Room on TryHackMe

This post details a comprehensive walkthrough of identifying and exploiting vulnerabilities within the as 'easy' tagged Mustacchio room on TryHackMe. The objective is to systematically enumerate services, exploit found vulnerabilities for initial access, escalate privileges, and capture flags, providing a technical perspective on ethical hacking practices.

· 9 min read

Solving the Mr. Robot CTF on TryHackMe

Hello fellow IT security enthusiasts! Today, I'm going to walk you through my process of solving the Mr. Robot CTF challenge on TryHackMe. This challenge is inspired by the popular TV series and it's all about recruiting you for fsociety. Let's dive in!

Enumeration through nmap

· 2 min read

A Deep Dive into Linux Privilege Escalation - Workshop now on GitHub!

In 2022, I had the pleasure of conducting a workshop on Linux Privilege Escalation (LPE) at my workplace. The special thing about it? We’ve made all the materials available on GitHub so that anyone can conduct this workshop themselves!

Together with a colleague, we spent an exciting time delving deep into this complex and fascinating topic. The workshop lasted about 1.5 to 2 hours - a short but intense period where we immersed ourselves in the depths of Linux permissions, kernel exploits, and much more.

What did we do?

· 2 min read

As a software developer with a keen interest in IT security, I’ve decided to create this space to share my thoughts, findings, and experiences related to this fascinating field.

In the ever-evolving world of technology, security is a paramount concern. Whether it’s protecting sensitive data, ensuring system integrity, or safeguarding against cyber threats, IT security plays a crucial role in our digital lives.

On this blog, I’ll be posting about various topics related to IT security that have caught my attention. From the intriguing security-related issues that I aim to explore, to the write-ups of Capture The Flag (CTF) challenges that I plan to undertake, my goal is to create a space that will hopefully offer a wealth of information in the future.

CTFs, in particular, are something I enjoy in my spare time. They offer a fun and engaging way to hone my skills, learn new techniques, and stay updated on the latest security trends.

So, whether you’re a fellow developer, an IT security enthusiast, or simply curious about the field, I hope you’ll find the content here insightful and engaging.

Stay tuned for more posts, and feel free to share your thoughts and comments. Let’s embark on this journey of exploring the intriguing world of IT security together!