
Binary Exploitation Writeup - Vault Breaker
This binary exploitation challenge was another exercise in performing a close reading of the source code. Rated “Very Easy” by Hack The Box, this pwn binary took the shortest amount of time relativ...

This binary exploitation challenge was another exercise in performing a close reading of the source code. Rated “Very Easy” by Hack The Box, this pwn binary took the shortest amount of time relativ...

HTB - El Teteo This was a delightful dip back into the domain of shellcode. Rated “Very Easy” by Hack The Box, this pwn binary could have taken a few hours to solve, but took me a few days to full...

HTB - Racecar This was a great way to get back into the swing of things. Rated “Very Easy” by Hack The Box, this pwn binary required a few hours of work on my part to solve. This challenge is shi...

Recently, I was spurred to update my familiarity with doing some wireless attacks. Unfortunately, my ALFA AWUS1900 network card wasn’t immediately recognized by my Kali Linux VM; this isn’t altoge...
Recently, I encountered an interesting phishing atttempt that I wanted to share. Note that this phishing campaign is on-going, with students continuing to report similar instances as of writing thi...

Introduction In this post, we are going to go over some of the classic vulnerabilities that can emerge in Java code and what we might do to help mitigate them. Through this survey, you should be a...

I’m finally graduating from Georgia Tech’s Online Master of Science Computer Science (OMSCS). For those of you interested, I’ve summarized my venture below (including pre-application preparatory ac...
Hi all! For those who periodically have visited this site, you may notice I’ve adopted a new look for the blog. The old site had a number of issues (both in performance and aesthetic) I wanted to ...
Introduction Cybersecurity certifications are a prominent way to develop your both your aptitude and employability. They serve as attestations by third-parties of your knowledge and competency, wh...
Introduction If you’re reading this, then first I should say: welcome to the community! Trying to figure out where to get started when considering a career in cybersecurity can be hard, but it do...