Latest Writeups

Hard

Directory

Do you have what it takes to crack this case?

Kerberos Digital Forensics Network Traffic Analysis

Planned Content

Web Application Security

OWASP Top 10, SQL injection, XSS, and web exploitation techniques

Network Security

Network enumeration, port scanning, and service exploitation

Privilege Escalation

Linux and Windows privilege escalation techniques and methodologies

Digital Forensics

Evidence analysis, memory forensics, and incident response

Cryptography

Encryption algorithms, hash cracking, and cryptographic attacks

Reverse Engineering

Binary analysis, malware analysis, and exploitation development

Current Progress

1
Completed Writeups
1
Challenges in Progress
August 2025
Second Release

Writeup Methodology

Each writeup will follow a structured approach to ensure comprehensive learning:

1

Initial Reconnaissance

Target identification, service enumeration, and information gathering

2

Vulnerability Assessment

Identifying potential attack vectors and security weaknesses

3

Exploitation

Step-by-step exploitation process with detailed explanations

4

Post-Exploitation

Privilege escalation, persistence, and evidence collection

5

Key Takeaways

Lessons learned, defensive measures, and skill development notes