Blog

Linux Privilege Escalation on HTB: A Beginner's Guide

Published on 2025-09-10 by sobbing

When I first started trying machine labs on HTB (HackTheBox), I struggled a lot with privilege escalation because I only had a very brief introduction ...

Read More

Tackling Web Exploitation Challenges

Published on 2025-07-07 by sobbing

This year I participated in MagpieCTF 2025 , which hosted many challenges including a web exploitation challenge called Cops Like Ciphers and Cookies . Before ...

Read More

The Necessity of Ad Block

Published on 2025-07-06 by Alan Zhou

According to Charles “Penguinz0” White Jr., “Internet Is Unusable Without Ad Block” on YouTube. Using an ad blocker provides essential cybersecurity protections and enhances privacy ...

Read More

CyberSci, Ballot Falsification Write-up

Published on 2024-11-28 by Folah

This year's CyberSci competition featured several challenges. I'll cover the first two in the web category and one from the forensics, where the main objective ...

Read More

CyberSci, Voter Registry Defence Write-up

Published on 2024-11-25 by Andrew

This year's CyberSci regionals had several defence challenges which involved patching vulnerable services. Solving these challenges gave us a ton of points and helped us ...

Read More

The SAR Approach: Responding to Data Leaks with Integrity

Published on 2024-10-22 by Maxwell

In the world of cybersecurity, you never know what you’ll stumble upon. Sometimes you stumble upon something you shouldn’t have, like a vulnerability in the ...

Read More
RSS