Notes from building and attacking an Active Directory lab, with emphasis on enumeration, trust relationships, and privilege escalation paths.
Web Exploitation Workflow
A practical workflow I use for approaching web targets in labs and CTFs, from surface mapping to exploit validation.
My First CTF
A short walkthrough of my first rooted CTF target, from initial enumeration to privilege escalation.