top of page

​
Search


Tokenizing the Sandwich Debate: How NLP Models Weigh In on Hot Dogs
Get the gist for Natural Language Processing (NLP) and how tokenization plays a factor
AtomicChonk
Apr 76 min read
213 views
0 comments


Running Laps on LAPS feat. HTB Timelapse
Winning the race on DACL abuse and LAPS through a HTB Timelapse walkthrough
Winifred
Jan 168 min read
31 views
0 comments


HTB Academy: "Footprinting Lab - Hard" Walkthrough
Walkthrough for HTB Academy's Footprinting Lab (Hard Difficulty)
Winifred
Aug 18, 20242 min read
592 views
0 comments


The Role of Social Media in Social Engineering: Facebook Edition
How your Facebook profile is making it easier for ne'er-do-wells to ruin your day
Winifred
Jun 13, 20245 min read
15 views
0 comments


Data Democracy: Is Your Voter Registration Data Safe?
During the peak of primary election season, most active voters are more concerned with the candidates and their stances on key divisive...
z3r0day_504
Mar 4, 20245 min read
19 views
0 comments


Using Generative AI in Social Engineering and Disinformation
How generative AI can expedite and strengthen social engineering efforts in cyber and disinformation campaigns
z3r0day_504
Oct 13, 20235 min read
16 views
0 comments


Email Spoofing When DMARC != Properly Configured
Email spoofing testing and how-to for when DMARC policies are improperly configured
z3r0day_504
Sep 25, 20233 min read
82 views
0 comments


Exploiting MS08-067 without Metasploit (HTB Legacy Walkthrough)
Enumeration First we run a generic nmap scan against the box to see what ports and services are available: We see that SMB is open, let's...
z3r0day_504
Sep 4, 20231 min read
178 views
0 comments


Exploiting MS17-010 without Metasploit (HTB Blue Walkthrough)
Enumeration First we run an nmap scan against the target: Here we can see that port 445 (SMB) is open. We also see the computer name as...
z3r0day_504
Aug 28, 20233 min read
223 views
0 comments


Exploiting CVE-2023-32784 (KeePass)
Overview Vulnerability in a Nutshell PoC Demo/Walkthrough Troubleshooting and Reliability Alternate Attack Paths for KeePass Overview...
z3r0day_504
Aug 22, 20233 min read
138 views
0 comments


DC31 Recon Village CTF Writeup
Overview This weekend we competed in Defcon 31's Recon Village CTF. As team "AtomicChonk" we came in second place and wanted to share...
z3r0day_504
Aug 13, 20233 min read
282 views
0 comments


CRTO Course and Exam Review
Overview Certified Red Team Operator (CRTO) is a certification opportunity presented by ZeroPointSecurity. The certification ties...
z3r0day_504
Aug 4, 20233 min read
127 views
0 comments


From Boots to Bugs: A Career Transition Tackling Cyber Frontlines and How You Can Make It There
I recently decided to pen this blog post because, upon looking back, I realize that my career path so far has been conventional in some...
z3r0day_504
Jun 19, 20238 min read
106 views
0 comments


OffSec Proving Grounds Practice Walkthrough: Helpdesk
Helpdesk is an easy level of difficulty that focuses on a directory traversal vulnerability in the software the endpoint is hosting....
z3r0day_504
May 29, 20231 min read
194 views
0 comments
Threat Groups Series: Dark Caracal
Dark Caracal emerged in the early 2010s and is believed by several sources to be related to the Lebanese General Directorate of General...
z3r0day_504
Apr 25, 20231 min read
60 views
0 comments


Threat Groups Series: APT 41
To kick off my threat groups series, I've decided to start with APT 41, highly suspected to be based out of China. Source of a large...
z3r0day_504
Apr 4, 20232 min read
124 views
0 comments


Basic Static Analysis of Raccoon Stealer
In today's blog post I'll be conducting some basic static analysis on Raccoon Stealer. Raccoon Stealer has been around for several years...
z3r0day_504
Mar 14, 20232 min read
84 views
0 comments


HTB Walkthrough: Chatterbox
Enumeration Running an nmap scan shows which ports are open and available: We see that there are ports running unknown services. Google...
z3r0day_504
Mar 6, 20232 min read
132 views
0 comments


HTB Walkthrough: Devel
Enumeration Start with an nmap scan: From there we can discern that ports 21 and 80 are open. Gaining Access Check port 21 (FTP) for...
z3r0day_504
Feb 20, 20232 min read
71 views
0 comments


How to Identify Online Scammers Before It's Too Late: The Story of Totyo and The Treadmill
We hear about scams all the time, whether it's through phishing, vishing, smishing, or whatever malevolent ishing-for-your-money there is...
z3r0day_504
Feb 10, 20236 min read
76 views
0 comments
Home: Subscribe

bottom of page