Pinned(My)Reasons Why I failed OSCP: Do Not Make Same MistakesSpoiler alert: I ended passing. But it wasn’t an easy challenge — I’ll admit that. Still, I believe people learn more from failures than…Mar 25A response icon4Mar 25A response icon4
PinnedOwn the OSCP AD set with these 4 simple stepsThe OSCP Active Directory section feels easier now without the need for an initial foothold. However, even in an “assumed breach” scenario…Feb 21A response icon3Feb 21A response icon3
RDP Feels Broken on VPN? Let Me Show You Why Remmina WorksI discovered Remmina when I started working on HTB Academy’s CAPE course. It was a suggestion from someone in the HTB Discord. Now that I’m…1d ago1d ago
MSSQL Permissions — Finally Explained ClearlyI have not seen a single pentest course that explains basic MSSQL permissions in a simple way. Not even HTB Academy — and that is one of…2d ago2d ago
Two IT Careers That Stood the Test of TimeMy time at HP marked a before-and-after in my professional life. I had the privilege of working with brilliant minds in both Puerto Rico…Jun 18Jun 18
Learning Kerberos the Hard Way — By Correcting the AIYou can use AI to test your knowledge in pretty much any field. Kerberos is no exception. I use it to generate mock-up questions and quiz…Jun 18Jun 18
Hacking MSSQL via Kerberos Delegation (Explained Simply)Kerberos is one of the main ways computers in a Windows domain verify your identity. But by default, it doesn’t let a server act on your…Jun 12Jun 12
Uncover MSSQL Targets in a Domain using SPNsIf you’ve looked into MSSQL pentesting, you’ve probably come across the term SPN (Service Principal Name). But it’s not always clear what…Jun 9Jun 9
What a Simple HTTP Response Can Tell a PentesterEnumeration is always the first step in any pentest — and that includes web applications. Even a basic HTTP request can uncover valuable…May 30May 30