Skip to content

Writeups

Welcome to the writeups section. Here you'll find detailed walkthroughs of machines, challenges, and security research.

  • Hack The Box


    Step-by-step machine walkthroughs covering enumeration, exploitation, and privilege escalation.

    HTB Writeups

  • Active Directory


    AD attack paths, enumeration techniques, post-compromise attacks, and domain takeover strategies.

    AD Writeups

Writeup Format

Each writeup follows a structured approach:

  1. Reconnaissance — Port scanning, service enumeration
  2. Foothold — Initial access and exploitation
  3. Privilege Escalation — Escalating to root/admin
  4. Key Takeaways — Lessons learned and techniques used