BLOG
Documenting the journey. CTF writeups, tool breakdowns, OSINT techniques.
Starting from a single image file — WindowsXP.jpg — and using ExifTool to extract GPS metadata, a username, and a full OSINT trail leading to social media profiles, a WiFi password, and an email address. Here's how I solved it step by step.
How I bypassed a one-time password system in a web challenge using source inspection and logic flaws in the authentication flow.
A PicoCTF cryptography challenge involving MD5 hashes stacked inside each other. Breaking it down layer by layer using Python and hashcat.
Notes and answers from TryHackMe's HTTP in Detail room — covering request methods, status codes, headers, and cookies.
Demonstrating AhMyth Remote Access Trojan in an isolated lab environment on my own equipment. Educational breakdown of how RATs operate.
A complete walkthrough of my home penetration testing lab. How I set up VirtualBox VMs for safe, isolated practice — and why it matters for every aspiring ethical hacker.