top of page
Jan 43 min read
Breaking the Signal: Going into the wireless network
To footprint a wireless network, We must identify the BSS (Basic Service Set) or Independent BSS (IBSS) provided by the access point....
Dec 23, 20245 min read
Art of Reconnaissance: From Battlefield to Browser - PART 0010
0010 : Footprinting Through Web services Web Services: Platforms like social networks and job sites reveal organizational data (e.g.,...
Dec 22, 20244 min read
Art of Reconnaissance: From Battlefield to Browser — PART 0001
Ancient and Medieval Techniques Scouts and Spies : Greeks, Romans, and Chinese used scouts and spies to gather intel on enemies. Assyrian...
Dec 12, 20243 min read
Behind the Commendation: Cyberforce 2024 and My Approach to Vulnerability Documentation.
When I worked on the vulnerability documentation for the Cyberforce program 2024, I focused on making it clear, structured, and easy to...
Dec 11, 20244 min read
S3 Buckets and Privilege Elevation: What Could Go Wrong?
1. Cracking the Cloud: Public or misconfigured S3 Buckets, what I excited and Security Oopsies. Amazon offers something called blob...
Feb 29, 20248 min read
MARIE - Assembly Language Programs
Let’s talk about some Marie programs! 1. Introduction of Marie Please refer to the below 2 resources to learn the introduction of Marie...
Feb 28, 20247 min read
Computer Breach and Data Loss (Basic Essential)
Overview of the Incident:Â A hacker gained access to the company's network through a phishing email that was sent to an employee. The...
Dec 18, 20232 min read
Vulnerability Management
60% of security patches happen because of unpatched vulnerabilities, updates, weaknesses, or threats. WHEN : Numerous security breaches,...
bottom of page