The Shell Log

Lame (Hack The Box) Full Write-Up

Lame (Hack The Box) Full Write-Up

In this second Hack The Box write-up, I walk through Lame step by step, from enumeration to full compromise, with a stronger focus on manual exploitation.

Editor (Hack The Box) Full Write-Up

Editor (Hack The Box) Full Write-Up

My first Hack The Box write-up — breaking down the Editor machine step by step, from initial enumeration to full compromise. Let’s get into it.

Starting My Cybersecurity Journey

Starting My Cybersecurity Journey

This space is where I document my journey into cybersecurity — from the basics to more advanced topics over time. I’m not an expert (yet), but I strongly believe that sharing the process is just as valuable as sharing the results.