Published onJun 10, 20236 mins readAnsible: A Basic IntroductionWhat is Ansible and why use it? This blog post will introduce the reader to a very basic usage of Ansible and some of its benefits.
Published onMay 21, 20239 mins readUseful Linux CommandsWhat are some of the most useful Linux commands? How do they work? What are their purposes?
Published onMay 14, 20233 mins readKubernetes explainedWhat are some of the core components of Kubernetes and how do they work together?
Published onApr 23, 20235 mins readSQL Injection: Union-based attacksHow are UNION-based SQLi attacks performed? What are some of the first steps to conduct when performing this attack?
Published onMar 29, 20235 mins readHow to exploit the docker groupLearn how being a member of the docker group on a Linux system makes you vulnerable to attack.
Published onFeb 13, 20235 mins readUnderstanding Windows Portable Executable headersHow are PE files structured? What data do the sections contain? Why are they even important?
Published onNov 1, 20225 mins readCreating forensic disk images via the command lineHow can we create images using dd, and how may we sanitize them?
Published onAug 24, 20223 mins readCracking protected ZIP files (Linux)How does one create and crack ZIP archives? It's pretty simple. Here's how.
Published onAug 12, 20222 mins readExploiting directory traversal (Linux)How to exploit directory traversal on a Linux server? What are the techniques to circumvent certain filters? And how does one mitigate this vulnerability?
Published onAug 2, 20223 mins readTwo types of SQL InjectionThis post explains two types of SQLi, and suggests briefly how to counteract them.