Reinventing the wheel while exploring cybersecurity concepts
Understanding NTLM: The Predecessor to Kerberos
An introduction to NTLM, its role in Windows authentication, and why it's still relevant today.
Read more ⟶
From PHP local file inclusion vulnerability to remote code execution
Learn how to identify and exploit a Local File Inclusion vulnerability in a PHP application to achieve Remote Code Execution.
Read more ⟶
Container networking
Ever wondered how container networking works? Inside this post I'll try to explain concepts behind it.
Read more ⟶