Hi there!

Hey, I'm RJ. I'm a cybersecurity professional who wanted a place to jot down some ramblings about all things cyber: penetration testing write-ups, certifications, and some tidbits I've found helpful when trying to turn 0's into 1's.

Latest Articles

Authby | Write-Up

Authby, an Intermediate-rated machine, is a Windows box with an open FTP share used to enumerate users, upload a reverse shell using cURL with various parameters, and escalate privileges with a kernel exploit of your choice.

Bashed | Write-Up

Bashed, an easy Linux box, has an easy foothold path that includes a built-in web shell followed by manipulating a file that is executed as root periodically on the machine.

Lame | Write-Up

Lame, an Easy-rated machine, takes advantage of outdated software for an easy exploit to root vulnerability.

Nineveh | Write-Up

Nineveh, a medium-rated machine from Hack the Box that takes advantage of different web servers susceptible to brute force attacks. Using both to interact with each other, we can exploit LFI to gain a foothold, followed by exploiting a binary running as root for privilege escalation.