TryHackMe Walkthough - Post-Exploitation Basics less than 1 minute read Room Link: Task 2 Enumeration w/ Powerview Share on X Facebook LinkedIn Bluesky Next Previous
AWS Lab Walkthrough: Troubleshooting IAM Access Issues 1 minute read Learn how to troubleshoot IAM role assumption failures by aligning identity-based policies and trust relationships while maintaining least privilege.
Exploiting AlwaysInstallElevated for Windows Privilege Escalation 1 minute read A walkthrough of exploiting the AlwaysInstallElevated misconfiguration on Windows to escalate from user to SYSTEM using a malicious MSI payload.
Devel Rooted: A Hack The Box Walkthrough 1 minute read This post is a walkthrough of the ‘Devel’ retired machine from Hack The Box. I gain initial access through an exposed FTP and WebDAV setup, then escalate pri...
LazyAdmin TryHackMe Walkthrough 3 minute read A complete walkthrough of the LazyAdmin room on TryHackMe, demonstrating enumeration, exploitation, and privilege escalation.