Posts
Ap3x Security
Cancel

Staying Organized and Productive

Summary When I’m working on a pentest and have a lot of windows open it tend to get cluttered. Then I spend time trying to finding what I need and lose focus or waste time. The past couple years I...

My First Physical Pentest

Physical Pentest Summary While on a business trip in Boston, MA I was asked if I wanted to join a fellow co-worker to test the security of a company at a nearby location. I said yes and took the ...

Exploit Exercise Protostar Stack Series

Exploit Exercises Protostar Stack Series In this series I will solve each of the seven levels of in from exploit exercises protostar. You can find more info about the challenges here. I will show ...

Pivoting with Chisel

Summary Recently I’ve completed the Hack The Box Dante Pro Labs and really enjoyed it. One of the most crucial pieces to being successful in the lab is understanding how to pivot properly. So I wan...

HTB Dante Pro Lab and THM Throwback AD Lab

Summary Over the course of a couple months I’ve been really busy with school and trying to finish my undergraduate degree in Computer Science and Engineering, but I managed to squeeze in some time ...

Hardware Hacking CTF - HackIN

Intro Recently, I competed in a CTF hosted by Booz Allen Hamilton and sponsored by NAVSEA and IN3 to name a few. I found out about the CTF through a social media post and a flyer that was sent thro...

Proxmox VM Creation Script for Quick Pentest Lab

Summary While studying for my OSCP I used various platforms to help me prepare for the exam such as Hack the Box and Pentester Labs. The only issue is that they all costed money for the features I ...

Infection Monkey - Securing My Network

DEFCON Safe Mode 2020 - Infection Monkey During this week of DEFCON Safe Mode I listened to a lot of fantastic talks from new techniques about Domain Hiding (Domain Fronting), Red Team CCDC techniq...

EggHunter x86_64

What is an Egg Hunter? Essentially an egg hunter is used assuming that you found a overflow vulnerability with a very small space that you, the attacker controls that is less that that of a bind/r...

Backdooring Portable Executables (PE)

Summary In this section of my I will be covering the topic of backdooring executables using shellcode and code caves. Code Caves Intro Many people may have never heard about code caves unless you...