top of page
Search
pragmat1c0n3
Jan 35 min read
Offensive-S3c: Squid - OffSec PG (ModerateMode)
In this blog post, I’ll be walking you through an alternative method to exploit the Squid vulnerable host from the OffSec Proving Grounds.
0 views0 comments
pragmat1c0n3
Dec 20, 202411 min read
Offensive-S3c: Squid - OffSec PG (EasyMode)
In this blog post, I’ll be walking you through an alternative method to exploit the Squid vulnerable host from the OffSec Proving Grounds.
1 view0 comments
pragmat1c0n3
Dec 9, 20247 min read
CrowdStrike Falcon: The Ultimate Guide to Deployment, Configuration, and Administration
<Introduction> CrowdStrike Falcon has long been recognized as a cutting-edge endpoint security solution, renowned for its AI-driven...
84 views0 comments
pragmat1c0n3
Nov 18, 20246 min read
Offensive-S3c: Helpdesk - OffSec PG
This is a detailed walk-through of the OffSec Proving Grounds Helpdesk vulnerable host.
0 views0 comments
pragmat1c0n3
Oct 23, 202411 min read
Active Directory Fundamentals: (Part 6: GPOs Demystified)
In this post I will shift my focus towards an equally important aspect: group policy objects (GPOs) and their significance within AD DS.
0 views0 comments
pragmat1c0n3
Oct 2, 20247 min read
Exploring the Power of Feroxbuster: A Versatile Web Fuzzer
The toolkit of penetration testers and security enthusiasts is Feroxbuster. Developed by Ben “epi” Risher.
0 views0 comments
pragmat1c0n3
Sep 19, 202410 min read
Offensive-S3c: Fanatastic - OffSec PG
<Introduction> In this blog post, I will be providing a detailed walkthrough of the OffSec Proving Grounds Fanatastic vulnerable host....
4 views0 comments
pragmat1c0n3
Sep 4, 202420 min read
Understanding the Phases of Penetration Testing
Introduction With cyber threats constantly morphing in today's digital landscape, organizations must prioritize the security of their...
6 views0 comments
pragmat1c0n3
Aug 19, 20247 min read
Offensive-S3c: Kevin - OffSec Proving Ground
A walkthrough of reconnaissance through post-exploitation. Including performing port scanning, service enumeration, and buffer overflow.
6 views0 comments
pragmat1c0n3
Aug 9, 20246 min read
Crowdstrike: A Faulty Update with Global Reach
On July 19, 2024, a major incident occurred involving CrowdStrike's Falcon sensor software, leading to a widespread Windows outage.
6 views0 comments
pragmat1c0n3
Jul 29, 20249 min read
Offensive-S3c: Blogger - OffSec Proving Ground
<Introduction> In this blog post, I will be doing a walkthrough of the OffSec Proving Grounds Blogger vulnerable host. I will provide a...
31 views0 comments
pragmat1c0n3
Jul 18, 20248 min read
Offensive-S3c: Keeper - HackTheBox
<Introduction> In this blog post, I will be doing a walkthrough of the HackTheBox Keeper vulnerable host. I’ll provide a walkthrough...
0 views0 comments
pragmat1c0n3
Jul 9, 202414 min read
Cybersecurity: Your Guide to Getting into the Field
In this post, I will delve deeper into how to enter the field of cybersecurity.
0 views0 comments
pragmat1c0n3
Jun 26, 20245 min read
Offensive-S3c: SunsetNoonTide - OffSec Proving Ground
In this blog post I will be doing a walkthrough of the OffSec Proving Grounds SunsetNoonTide vulnerable host.
8 views0 comments
pragmat1c0n3
Jun 17, 202414 min read
DevOps Essentials: Getting Started with Pipeline Automation
DevOps, a blend of development and operations, has revolutionized how teams deliver software, fostering collaboration and improvement.
0 views0 comments
pragmat1c0n3
Jun 3, 20248 min read
Active Directory Fundamentals (Part Five: From Local to Global)
This blog post is part five of the Cyb3r-S3c series on Microsoft's Active Directory Domain Services (AD DS).
1 view0 comments
pragmat1c0n3
May 14, 20243 min read
Building Trust in the Age of AI: A Brief Look at AI Security
Technology is advancing faster than ever, and the rapid integration of Artificial Intelligence (AI) is reshaping our world.
2 views0 comments
pragmat1c0n3
Mar 1, 20246 min read
Offensive-S3c: Gaara - OffSec Proving Ground
In this blog post, I documented my walkthrough of the OffSec Proving Grounds Gaara vulnerable host.
3 views0 comments
pragmat1c0n3
Jan 19, 20242 min read
API Security: Building a Foundation of Knowledge
Introduction Web application API security testing refers to the process of evaluating and assessing the security of the Application...
4 views0 comments
pragmat1c0n3
Jan 8, 20249 min read
Web Application Security Testing (WAST): A Brief Introduction
This blog post discusses Web Application Security Testing (WAST) and how it's used to identify and mitigate vulnerabilities in webapps.
7 views0 comments
bottom of page