🐶 Puppy
MediumComplete Active Directory takeover through BloodHound analysis, ACL abuse, KeePass exploitation, DPAPI extraction, and DCSync attacks.
Read WriteupExploring offensive security, defensive operations, and digital forensics
Offensive Security
Defensive Operations
Incident Analysis
Complete Active Directory takeover through BloodHound analysis, ACL abuse, KeePass exploitation, DPAPI extraction, and DCSync attacks.
Read WriteupComplex Active Directory attack involving Kerberos authentication, Excel credential extraction, Kerberoasting, deleted object recovery, DPAPI exploitation, WSL abuse, and NTDS database extraction.
Read WriteupNext.js authentication bypass through middleware vulnerability, Local File Inclusion exploitation, credential extraction, and Terraform provider override privilege escalation to root.
Read WriteupComplete machine compromise through CrushFTP CVE-2025-31161 authentication bypass, user creation, file upload exploitation, credential extraction from Erlang scripts, and privilege escalation via local SSH service running as root.
Read WriteupStraightforward attack path leveraging TFTP file discovery, IKE aggressive mode PSK extraction, offline cracking, and CVE-2025-32462 sudo privilege escalation for complete system compromise.
Read WriteupClassic Active Directory exploitation chain leveraging certificate-based authentication, Kerberos Silver Ticket forgery, MSSQL xp_cmdshell abuse, and privilege escalation through manipulated group memberships.
Read WriteupDocumenting defensive security knowledge, SOC workflows, detection methodology, and real-world triage case studies.
A structured breakdown of what makes a high-quality security alert, how to classify outcomes (TP/FP/NMI/FN), the SOC analyst mindset, the full 8-step detection-to-feedback workflow, and a real-world impossible travel case study.
Read WriteupA deep dive into NSM fundamentals — the three types of network evidence, Zeek log analysis, and pro-level detection techniques for beaconing, DNS tunneling, DGA hunting, and JA3 fingerprinting.
Read WriteupFuture writeups will cover threat hunting methodologies, SIEM rule tuning, EDR deep visibility queries, and live incident response exercises from Locked Shields.
Coming SoonDisk, memory, malware analysis — reconstructing attacker activity from artifacts left behind.
Digital forensics fascinates me because it's like being a detective in the digital world. Every incident leaves traces, and learning to find, preserve, and analyze these artifacts is both challenging and rewarding. My forensics journey combines technical skills with methodical investigation techniques to uncover the truth behind security incidents.
I'm developing expertise in analyzing disk images and memory dumps to recover deleted files, examine browser history, extract credentials, and reconstruct attacker activity. Working with tools like Autopsy and FTK, I'm learning proper evidence handling procedures and chain of custody protocols. Memory forensics with Volatility has opened my eyes to how much information persists in RAM.
Understanding malware behavior is crucial for forensic investigations. I'm learning both static and dynamic analysis techniques to dissect malicious software, understand its capabilities, and identify Indicators of Compromise (IOCs). Tools like IDA Pro, Ghidra, and various sandboxes help me reverse engineer malware samples safely and document their behavior patterns.
Creating accurate timelines of events is essential in forensics. I'm mastering timestamp artifacts from file system metadata (MAC times), Windows Registry, event logs, and application artifacts to build comprehensive attack timelines. Tools like Plaso and log2timeline help me correlate events across multiple systems and identify the full scope of incidents.
Autopsy, FTK Imager, EnCase
Volatility, Rekall, WinDbg
IDA Pro, Ghidra, x64dbg
Binwalk, Exiftool, strings
Wireshark, NetworkMiner, tcpdump
Plaso, log2timeline, Timesketch
Welcome to my cybersecurity learning journey! I'm documenting my progression across red team offensive security, blue team defensive operations, and digital forensics. Each aspect complements the others — understanding attacks makes me a better defender, defensive knowledge improves my attack strategies, and forensics ties everything together by revealing the full story of what happened.