-
Axios supply chain attack: The Impact of Downloading Unchecked NPM Packages
Attention to all developers using Axios! If you are using one of the following versions of the axios npm package (v1.14.1 or v0.30.4), you should check…
-
HackTheBox: Oopsie Writeup
Overview Oopsie is a Linux-based HackTheBox machine that involves web application authentication bypass, database credential extraction, and privilege escalation through PATH manipulation. This writeup…
-
HackTheBox: Markup Writeup
Overview Markup is a Windows-based HackTheBox machine that involves web application exploitation through XXE (XML External Entity) injection, SSH key extraction, and privilege escalation…
-
HackTheBox: Unified Writeup
Overview Unified is a Linux-based HackTheBox machine featuring a UniFi Network Controller application vulnerable to Log4j (CVE-2021-44228). This writeup details the exploitation process from…
-
Hack The Box – Archetype (Concise Write‑Up)
1. Scanning & Enumeration Initial scan (fast or full): Open Ports Observation: 2. SMB Enumeration Since SMB is exposed, enumerate shares anonymously: Discovered Share…
Search

Ali Haddani
Leveraging cybersecurity monitoring and threat intelligence to help organizations proactively manage risks and secure their information systems.
Latest Posts
Categories
Assume breach. Train offense. Defend continuously.
Attackers evolve daily. The defense must think like attackers without becoming one.
Latest News & Articles
Check our latest writeups about CTF machines,CVEs and many more

