admin@rewks.com:~$ echo 'Hello, World!'

Cyber Security professional who sometimes writes about stuff.

Multicast Name Resolution Protocols - Dangers and Remediation

2025-07-19

Multicast Name Resolution Protocols like LLMNR, NBT-NS, and mDNS can pose significant security risks in network environments. This post discusses the dangers associated with these protocols and provides guidance on how to mitigate these risks effectively.

MulticastLLMNRNBT-NSmDNS

NTLMv1 Protocol Weaknesses and Attacks

2025-05-24

If you've spent some time in the cybersecurity field, you might have come across NTLMv1. This authentication protocol, while once widely used, has fundamental weaknesses that make it an attractive target for attackers. In this blog post, we will explore these weaknesses and how they can be exploited.

NTLMv1Auth CoercionRelayingCrackingRBCD

Cyber Apocalypse 2022 - Red Island (Web: 325 points)

2022-05-19

For this web challenge we'll chain together multiple vulnerabilities, starting from a simple SSRF and resulting in RCE through a Redis service.

CTFSSRFRedisRCE

Pico CTF 2022 - Noted (Web: 500 points)

2022-03-27

To solve this challenge we need to make use of stored cross-site scripting (XSS) as well as server-side request forgery (SSRF) whilst taking advantage of an automated user in the form of a headless chrome browser.

CTFJavaScriptXSSSame Origin Policy