Blog

Writeups, research, and security insights

My Web Application Pentest Methodology

A practical guide to my personal web application penetration testing methodology, from reconnaissance to reporting.

Web Security Methodology OWASP Bug Bounty

HackTheBox: Phantom Machine Walkthrough

A detailed walkthrough of the Phantom machine on HackTheBox, covering enumeration, initial foothold via a deserialization vulnerability, and privilege escalation through a misconfigured SUID binary.

HackTheBox CTF Linux Privilege Escalation