
Do I need a degree to get into cybersecurity?
Starting Point At one point or another, most people looking to carve out a career in cybersecurity look to figure out whether or not they need to go to university for a degree (and if so, what kin...
Starting Point At one point or another, most people looking to carve out a career in cybersecurity look to figure out whether or not they need to go to university for a degree (and if so, what kin...
Prologue These are my writeups of a few of the reverse engineering problems I tackled during this year’s HacktheBox Cyber Apocalypse 2025 CTF. Unfortunately, I could only allocate a few hours in t...
This ended up being a good introductory exercise to injecting shellcode. Rated “Very Easy” by Hack The Box, this pwn binary, this challenge took only a few minutes to exploit having got back into t...
If you’re interested in working in cybersecurity, you’ve probably seen at some point or another the plethora of articles, blogs, videos, etc. suggesting that there is a growing gap in the cybersecu...
HTB - Space Pirate: Going Deeper This was a pretty standard buffer overflow exercise. Rated “Very Easy” by Hack The Box, this pwn binary was a pretty cut-and-dry exercise (with the only real point...
This binary exploitation challenge was another exercise in performing a close reading of the source code. Rated “Very Easy” by Hack The Box, this pwn binary took the shortest amount of time relativ...
HTB - El Teteo This was a delightful dip back into the domain of shellcode. Rated “Very Easy” by Hack The Box, this pwn binary could have taken a few hours to solve, but took me a few days to full...
HTB - Racecar This was a great way to get back into the swing of things. Rated “Very Easy” by Hack The Box, this pwn binary required a few hours of work on my part to solve. This challenge is shi...
Recently, I was spurred to update my familiarity with doing some wireless attacks. Unfortunately, my ALFA AWUS1900 network card wasn’t immediately recognized by my Kali Linux VM; this isn’t altoge...
Recently, I encountered an interesting phishing atttempt that I wanted to share. Note that this phishing campaign is on-going, with students continuing to report similar instances as of writing thi...