
Binary Exploitation Writeup - Racecar
HTB - Racecar This was a great way to get back into the swing of things. Rated “Very Easy” by Hack The Box, this pwn binary required a few hours of work on my part to solve. This challenge is shi...

HTB - Racecar This was a great way to get back into the swing of things. Rated “Very Easy” by Hack The Box, this pwn binary required a few hours of work on my part to solve. This challenge is shi...

Recently, I was spurred to update my familiarity with doing some wireless attacks. Unfortunately, my ALFA AWUS1900 network card wasn’t immediately recognized by my Kali Linux VM; this isn’t altoge...
Recently, I encountered an interesting phishing atttempt that I wanted to share. Note that this phishing campaign is on-going, with students continuing to report similar instances as of writing thi...

Introduction In this post, we are going to go over some of the classic vulnerabilities that can emerge in Java code and what we might do to help mitigate them. Through this survey, you should be a...

I’m finally graduating from Georgia Tech’s Online Master of Science Computer Science (OMSCS). For those of you interested, I’ve summarized my venture below (including pre-application preparatory ac...
Hi all! For those who periodically have visited this site, you may notice I’ve adopted a new look for the blog. The old site had a number of issues (both in performance and aesthetic) I wanted to ...
Introduction Cybersecurity certifications are a prominent way to develop your both your aptitude and employability. They serve as attestations by third-parties of your knowledge and competency, wh...
Introduction If you’re reading this, then first I should say: welcome to the community! Trying to figure out where to get started when considering a career in cybersecurity can be hard, but it do...

About one year ago HackTheBox (HTB) announced its second certification available to the public: the Certified Penetration Testing Specialist (CPTS). This certification follows their earlier Certif...
In this post, we’re going to discuss some of the nuances that go into performing the actual job hunt for your next (or perhaps, first) cybersecurity job. When looking to launch a career in cybersec...