Labs
Explore writeups and walkthroughs for labs and challenges outside TryHackMe. Documenting real-world scenarios and custom environments.
Latest Writeups
Jumbo Lab
In-depth walkthrough of the Jumbo Lab environment
Gazole Lab
Security assessment of a petroleum conglomerate's web application
New Lab
Stay tuned for upcoming lab writeups!
Planned Lab Content
Network Exploitation
Custom network environments, protocol analysis, and network pivoting techniques
Defense Evasion
Antivirus bypass, rootkits, and persistence mechanisms in modern systems
Cloud Security
AWS, Azure, and GCP security configurations and exploitation scenarios
Mobile Security
Android and iOS application security assessments and exploitation
Cryptography
Advanced encryption, hash cracking, and cryptographic implementation flaws
Current Progress
Stay Updated
Connect with me on social media to get notified when new lab writeups are published!
Lab Methodology
Each lab writeup follows a structured approach to ensure comprehensive learning:
Environment Setup
Detailed configuration of the lab environment and tools required
Target Analysis
Comprehensive reconnaissance and vulnerability identification
Exploitation Process
Step-by-step exploitation with detailed explanations and alternatives
Post-Exploitation
Maintaining access, privilege escalation, and evidence collection
Lessons Learned
Key takeaways, defensive measures, and skill development notes