Reinventing the wheel while exploring cybersecurity concepts

Understanding NTLM: The Predecessor to Kerberos


An introduction to NTLM, its role in Windows authentication, and why it's still relevant today.
Read more ⟶

From PHP local file inclusion vulnerability to remote code execution


Learn how to identify and exploit a Local File Inclusion vulnerability in a PHP application to achieve Remote Code Execution.
Read more ⟶

Container networking


Ever wondered how container networking works? Inside this post I'll try to explain concepts behind it.
Read more ⟶