Cyber Security professional who sometimes writes about stuff.
Multicast Name Resolution Protocols - Dangers and Remediation
2025-07-19Multicast Name Resolution Protocols like LLMNR, NBT-NS, and mDNS can pose significant security risks in network environments. This post discusses the dangers associated with these protocols and provides guidance on how to mitigate these risks effectively.
NTLMv1 Protocol Weaknesses and Attacks
2025-05-24If you've spent some time in the cybersecurity field, you might have come across NTLMv1. This authentication protocol, while once widely used, has fundamental weaknesses that make it an attractive target for attackers. In this blog post, we will explore these weaknesses and how they can be exploited.
Cyber Apocalypse 2022 - Red Island (Web: 325 points)
2022-05-19For this web challenge we'll chain together multiple vulnerabilities, starting from a simple SSRF and resulting in RCE through a Redis service.
Pico CTF 2022 - Noted (Web: 500 points)
2022-03-27To solve this challenge we need to make use of stored cross-site scripting (XSS) as well as server-side request forgery (SSRF) whilst taking advantage of an automated user in the form of a headless chrome browser.