Being curious
Home
All posts
Tags
Posts
31
Jan 2021
Recent Strong User Authentication Adoption
Failure of authentication can lead to significant impact for consumers, business, and government. Despite the recommende...
24
Dec 2020
Kringlecon 2020 Terminals Walkthrough
Walkthrough of Kringlecon 2020 terminals & minigames. <!--more--> ### Overview The below entry only covers solutions to...
24
Dec 2020
Kringlecon 2020 Walkthrough
Walkthrough of Kringlecon 2020 objectives. <!--more--> ### Overview The below entry only covers solutions to the Object...
17
Feb 2020
Jarvis Hack The Box Walkthrough
Walkthrough of machine Jarvis from Hack the Box. Key findings include website vulnerable to SQL injection, internal scri...
13
Jan 2020
Kringlecon 2019 Solution
Copy of my Kringlecon 2019 Walkthrough is [published here](/pdf/KringleCon2019-Walkthrough.pdf)
29
Sep 2019
Swagshop Hack The Box Walkthrough
Walkthrough of machine Swagshop from Hack the Box. Key findings include lack of patching on an ecommerce site & inapprop...
25
Sep 2019
Code Injection Attacks
Copy of a paper I wrote as part of my postgraduate studies on Code Injection Attacks. <!--more--> ### Executive Summary ...
15
Sep 2019
Luke Hack The Box Walkthrough
Walkthrough of machine Luke from Hack the Box. Key findings include exposed credentials & running a web service as a pri...
08
Sep 2019
Bastion Hack The Box Walkthrough
Walkthrough of machine Bastion from Hack the Box. Key findings include production backup data being left unencrypted and...
02
Sep 2019
Achieving OSCP
Lessons I learnt from completing the Penetration Testing with Kali Linux (PWK) course and passing the Offensive Security...
01
Sep 2019
Onetwoseven Hack The Box Walkthrough
Walkthrough of machine Onetwoseven from Hack the Box. Key findings include gaps in a chroot configuration, insufficient ...
15
Jun 2019
JetAudio jetCast Server 2.0 exploit
### Overview Below work was done as part of Udemy course - [https://www.udemy.com/hands-on-exploit-development/](https:...
13
May 2019
Report on Equifax Data Breach Incident
Copy of a paper I wrote as part of my postgraduate studies on Social Engineering. <!--more--> ### Introduction #### Bac...
19
Jan 2019
Social Engineering Protecting Systems from Users
Copy of a paper I wrote as part of my postgraduate studies on Social Engineering. <!--more--> ### Introduction Social en...
16
Jan 2019
Kringlecon 2018 Walk through
Walkthrough of machine Luke from Hack the Box. Key findings include exposed credentials & running a web service as a pri...
01
Mar 2018
Installing Filebeat on Raspberry PI 3
How to setup elastic Filebeat from scratch on a Raspberry Pi. At time of writing Elastic do not provide ARM builds for a...