Writeups¶
Welcome to the writeups section. Here you'll find detailed walkthroughs of machines, challenges, and security research.
-
Hack The Box
Step-by-step machine walkthroughs covering enumeration, exploitation, and privilege escalation.
-
Active Directory
AD attack paths, enumeration techniques, post-compromise attacks, and domain takeover strategies.
Writeup Format
Each writeup follows a structured approach:
- Reconnaissance — Port scanning, service enumeration
- Foothold — Initial access and exploitation
- Privilege Escalation — Escalating to root/admin
- Key Takeaways — Lessons learned and techniques used