Insights from a cybersecurity-certified IT enthusiast navigating the digital frontier.
Learn how I abused SeBackupPrivilege and SeRestorePrivilege on a Windows target to extract sensitive registry hives, dump password hashes, and perform a successful pass-the-hash attack to capture the Administrator flag.
Abused an SUID base64, cracked hashes with John, and used sudo-find to grab both user and root flags
A Beginner’s Guide to Vulnerability Scanning using Greenbone GVM
Securing Your Cloud, Optimizing Your Infrastructure, Ensuring Your Compliance