// SECURITY_BLOG

CTF writeups, penetration testing techniques, OSINT methodologies, and security research

Continue Reading →

HackTheBox: Manager - Complete Walkthrough

Full walkthrough of the Manager machine from HackTheBox. Covering initial enumeration, Active Directory exploitation, privilege escalation, and persistence techniques.

Windows Active Directory Privilege Escalation
Read Full Writeup →

Web Application Penetration Testing Methodology

Systematic approach to web application security testing. From reconnaissance and vulnerability identification to exploitation and reporting.

Web Security OWASP Methodology
Read More →

Email Intelligence: From Address to Digital Footprint

Comprehensive guide to email-based OSINT. Learn techniques for discovering associated accounts, data breaches, social media profiles, and digital presence from a single email address.

Email OSINT Reconnaissance Tools
Read More →

Network Segmentation Best Practices for SMBs

Practical guide to implementing network segmentation in small to medium businesses. VLANs, firewall rules, and access control strategies.

Networking Security Architecture VLANs
Read More →

Building Custom OSINT Tools with Python

Step-by-step tutorial on creating custom OSINT automation tools using Python. API integration, data parsing, and result aggregation techniques.

Python Automation Development
Read More →

TryHackMe: Active Directory Basics - Full Walkthrough

Complete solution for TryHackMe's Active Directory fundamentals room. Domain enumeration, Kerberos attacks, and lateral movement techniques explained.

Active Directory Kerberos Enumeration
Read Full Writeup →