Red Team Operations
Penetration Testing & Offensive Security Research
HTB Season 9 Top 1% (Holo) ranking through systematic exploitation of Active Directory environments, web applications, container escapes, and privilege escalation chains. Demonstrating attacker TTPs to strengthen defensive capabilities.
HTB Season 9 ranked, Active Directory specialist, and offensive security researcher focused on realistic attack simulations and security assessments.
Active hands-on training across industry-leading cybersecurity platforms
๐ Offensive Security Certifications
โญ Featured Achievement
๐ HTB Season 9 โ Season of the Gacha
Rank: 95 / 9,850 Players (Top ~1%) | Badge: Holo
Achievement: 13/13 Roots โข 13/13 Users โข Perfect completion
Achieved top 1% ranking through consistent exploitation across diverse attack vectors: Active Directory abuse (Kerberos delegation, shadow credentials, ESC1), web application vulnerabilities (logic flaws, SSRF, RCE), container escapes, and advanced privilege escalation techniques.
- AD Exploitation: Certificate abuse, shadow credentials, Kerberos attacks, ACL manipulation
- Web Security: IDOR, SQL injection, SSRF, file upload bypasses, CMS exploitation
- Container Tech: Docker escapes, registry abuse, Kubernetes misconfigurations
- Privilege Escalation: Sudo abuse, SUID binaries, service misconfigurations, kernel exploits
๐ Seasonal Performance
| Season | Tier | Proof | Achievement | Link |
|---|---|---|---|---|
| HTB Season 9 โ Season of the Gacha | ๐ Holo (Top ~1%) |
|
Rank: 95 / 9850 (Top ~0.96%) โข Users: 13 / 13 โข Systems: 13 / 13 | View |
| HTB Season 8 โ Depths | ๐ Platinum (Top ~9%) |
|
Rank: 739 / 8036 (Top ~9.19%) โข Users: 10 / 13 โข Roots: 10 / 13 | View |
๐๏ธ HTB Seasonal Boxes
Current and recent seasonal boxes demonstrating Active Directory exploitation, web application security, container escapes, and multi-stage attack chains.
| Machine | Difficulty | Status | Proof | Writeup | Summary |
|---|---|---|---|---|---|
| Facts | Easy | โ Done |
|
View |
View chain
Camaleon CMS IDOR vulnerability in user profile management โ privilege escalation to administrator role โ S3-compatible MinIO credentials exposed in CMS configuration โ AWS CLI enumeration of internal buckets โ SSH private key extraction from object storage โ passphrase cracking with John the Ripper โ SSH access as trivia user โ sudo permissions on facter utility โ arbitrary code execution via custom Ruby facts โ root shell.
|
| HTB Season 9 โ Season of the Gacha | Season | ๐ Holo |
|
View |
View chain
Rank: 95 / 9850 Players โข Roots: 13 / 13 โข Users: 13 / 13 (Top ~1%)
|
| Eloquia | Insane | โ Done |
|
View |
View chain
Multi-layer enterprise compromise: web logic flaws โ containerised service abuse โ trust boundary violations โ host-level escalation through operational tooling โ persistence via insecure custom services, resulting in complete SYSTEM control.
|
| MonitorsFour | Easy | โ Done |
|
View |
View chain
Configuration leak leads to authentication bypass โ admin access in a monitoring platform โ remote code execution inside a container โ abuse of exposed container management interfaces to escape isolation and gain full control of the Windows host.
|
| Gavel | Medium | โ Done |
|
View |
View chain
Leaked application source โ logic-level SQL injection โ credential recovery โ administrative feature abuse โ arbitrary rule execution โ privilege escalation via a misdesigned setuid client communicating with a root-owned daemon.
|
| Fries | Hard | โ Done |
|
View |
View chain
Hybrid Linux/Windows environment compromise: source-code disclosure โ container service abuse โ credential harvesting via internal tooling โ Active Directory escalation using identity misconfiguration and certificate trust abuse to reach domain admin.
|
| Eighteen | Easy | โ Done |
|
View |
View chain
Valid low-priv access โ MSSQL data exposure โ application credential recovery โ lateral movement via remote management โ modern AD abuse to escalate from user to full domain compromise.
|
| NanoCorp | Hard | โ Done |
|
View |
View chain
Corporate Windows AD attack chain: external web service abuse โ credential exposure and reuse โ AD enumeration with delegated rights โ controlled account manipulation โ SYSTEM-level escalation through insecure monitoring infrastructure.
|
| Giveback | Medium | โ Done |
|
View |
View chain
Web application foothold via third-party plugin abuse โ containerised environment enumeration โ credential leakage through service configuration โ pivot across internal services and escape container boundaries โ leverage privileged runtime components to gain root on the host.
|
| Conversor | Medium-Hard | โ Done |
|
View |
View chain
Web file-transform parser abuse: exploit server-side upload/processing to gain a foothold, recover forgotten local DB/config secrets and reused credentials, then leverage sudo/service misconfigurations for a clean privilege escalation to root.
|
| Hercules | Insane | โ Done |
|
View |
View chain
Identity-first AD / PKI chain: initial foothold โ enumerate AD ACLs and certificate templates โ abuse delegated rights to enable/reset accounts and modify OU ACLs โ request certificates (on-behalf-of flows) and export PFXs โ convert PFX โ PEM โ PKINIT to get ccaches/TGTs โ use tickets or client-cert auth to get WinRM shells โ reset service account passwords, harvest machine/service keys and use Impacket (changepasswd/getST) and S4U/S4U2Proxy to impersonate Administrator and own the domain.
|
| Signed | Medium | โ Done |
|
View |
View chain
MSSQL extended-proc enumeration โ trigger SMB callback to capture service NTLMv2 โ crack service hash โ convert hex SIDs & craft Kerberos silver ticket for MSSQL SPN โ use forged ticket to gain dbo/sysadmin โ xp_cmdshell / OPENROWSET to read flags and pivot to domain.
|
| DarkZero | Hard | โ Done |
|
View |
View chain
Split-horizon DNS + linked MSSQL servers โ xp_cmdshell foothold โ Meterpreter โ flaky kernel exploit (CVE-2024-30088) or hash-dump fallback โ Rubeus ticket capture (xp_dirtree) + pivots โ Domain Admin.
|
| Imagery | Medium | โ Done |
|
View |
View chain
Image transform RCE โ shell as web user โ decrypt readable backup to recover creds โ sudo /usr/local/bin/charcol scheduling abuse โ root.
|
| Expressway | Easy | โ Done |
|
View |
View chain
IKE Aggressive Mode PSK crack โ SSH as ike โ sudo -h offramp.expressway.htb โ root.
|
| HTB Season 8 โ Depths | Season | ๐ Platinum |
|
View |
View chain
Rank: 739 / 8036 (Top ~9%) โข Roots: 10 / 13 โข Users: 10 / 13
|
| Cobblestone | Hard | โ Done |
|
View |
View chain
Web foothold โ DB creds โ SSH tunnel to XML-RPC service โ Arbitrary file leak โ Root
|
| Editor | Easy | โ Done |
|
View |
View chain
nvme compile bug โ binary patch โ buffer overflow โ ROP โ reverse shell โ proof
|
| Era | Medium | โ Done |
|
View |
View chain
Subdomain fuzz โ SSRF via download preview โ DB leak โ web RCE โ SUID bash โ ASN1 signature bypass โ root.txt
|
| Mirage | Hard | โ Done |
|
View |
View chain
GetNPUsers โ Kerberos ticket crack โ shadow credentials โ ESC1 abuse via Certipy โ DA hash โ root.txt
|
| Outbound | Easy | โ Done |
|
View |
View chain
Web creds reuse โ Roundcube RCE โ container escape โ MySQL plaintext leak โ symlink overwrite to /etc/passwd โ root
|
| Voleur | Medium | โ Done |
|
View |
View chain
Kerberos TGT โ SMB creds โ DPAPI masterkey + creds โ BloodHound path โ SSH via id_rsa โ Registry + NTDS.dit โ secretsdump โ getTGT โ Domain Admin
|
| RustyKey | Hard | โ Done |
|
View |
View chain
WinRM creds โ BloodHound edge โ GenericWrite โ password reset โ ProtectedUsers removal โ S4U2Proxy โ Domain Admin
|
| Artificial | Easy | โ Done |
|
View |
View chain
TensorFlow RCE via model โ SQLite loot โ MD5 crack โ RESTIC trick โ SUID bash root
|
| Sorcery | Insane | โ Done |
|
View |
View chain
Git leak โ passkey bypass โ Kafka RCE โ Docker registry โ IPA privesc
|
| TombWatcher | Hard | โ Done |
|
View |
View chain
gMSA abuse โ ACL pivot โ deleted obj restore โ CVE โ Domain Admin
|
| Fluffy | Hard | โ Done |
|
View |
View chain
NTLMv2 โ shadow creds โ ADCS ESC1 โ Pass-the-Cert โ Domain Admin
|
| Puppy | Medium | โ Done |
|
View |
View chain
LDAP โ KeePass โ password reset โ DPAPI secrets โ NTDS.dit dump
|
| Certificate | Medium | โ Done |
|
View |
View chain
Cert template abuse โ Certipy โ Evil-WinRM โ Administrator shell
|
Seasonal tally: 29 boxes โ โ 27 completed ยท ๐ฉ 7 easy ยท ๐จ 9 medium ยท ๐ฅ 9 hard ยท ๐ช 3 insane
๐ฆ HTB Retired Boxes
Full write-ups available for all retired boxes covering diverse attack techniques and methodologies.
| Machine | Difficulty | Status | Proof | Writeup | Summary |
|---|---|---|---|---|---|
| Lock | Easy | โ Done | ![]() | View | View chain โถ
Gitea CI/CD abuse โ ASPX webshell โ RDP creds via mRemoteNG config โ PDF24 CVEโ2023โ49147 oplock โ SYSTEM shell โ Root flag
|
| Code | Easy | โ Done | ![]() | View | View chain โถ
SQLi โ MD5 crack โ path traversal โ SSH โ root
|
| Sauna | Easy | โ Done | ![]() | View | View chain โถ
ASREPRoast โ WinRM โ winPEAS โ autologon creds โ DCSync via BloodHound โ psexec w/ Admin hash โ root.txt
|
| Kryptos Support | Medium | โ Done | ![]() | View | View chain โถ
OAuth token leak โ IDOR โ XSS โ JWT tamper โ GPG decrypt โ flag
|
| Unicode | Medium | โ Done | ![]() | View | View chain โถ
JWT forgery โ Host-split Unicode LFI โ SSH as `code` โ Python bin reverse via `pyinstxtractor` โ root.txt
|
| Sau | Easy | โ Done | ![]() | View | View chain โถ
SSRF (CVE-2023-27163) โ Maltrail unauth RCE โ Shell as `puma` โ `sudo systemctl` โ root.txt
|
| Support | Medium | โ Done | ![]() | View | View chain โถ
Kerberoast โ AS-REP โ impersonate S4U2Self โ Rubeus abuse โ Administrator shell
|
| VulnEscape | Easy | โ Done | ![]() | View | View chain โถ
RDP login (KioskUser0:blank) โ Edge `file://` escape โ CMD rename bypass โ RD+ creds โ BulletPassView โ `runas` โ root.txt
|
| Reset | Easy | โ Done | ![]() | View | View chain โถ
Password reset bypass โ log poisoning RCE โ rlogin + tmux hijack โ sudo nano escape โ root.txt
|
| Ten | Hard | โ Done | ![]() | View | View chain โถ
Web host creation โ FTP traversal via DB edit โ SSH key planting โ Apache log pipe โ root
|
| Data | Easy | โ Done | ![]() | View | View chain โถ
Grafana LFI โ DB dump โ SHA-256 password crack โ Docker escape โ root
|
| Dog | Easy | โ Done | ![]() | View | View chain โถ
Git repo dump โ CMS RCE โ PHP utility privilege escalation
|
| Cat | Medium | โ Done | ![]() | View | View chain โถ
Git repo leak โ Stored XSS cookie theft โ SQLite SQLi โ Apache logs โ Gitea XSS for privesc
|
| Titanic | Easy | โ Done | ![]() | View | View chain โถ
LFI โ SQLite โ Gitea โ ImageMagick identify RCE โ root
|
| Administrator | Medium | โ Done | ![]() | View | View chain โถ
AD domain takeover โ Kerberoast โ DCSync โ Admin hash
|
| Beep | Medium | โ Done | ![]() | View | View chain โถ
vtigerCRM LFI โ legacy creds reuse โ root via SSH
|
| Trick | Medium | โ Done | ![]() | View | View chain โถ
DNS & SQLi โ email RCE โ fail2ban privesc
|
| Waldo | Medium | โ Done | ![]() | View | View chain โถ
LFI โ SSH key โ restricted shell escape โ cap_dac_read
|
| Retro | Medium | โ Done | ![]() | View | View chain โถ
Certipy ESC1 abuse โ machine account cert โ auth + hashdump
|
| Down | Easy | โ Done | ![]() | View | View chain โถ
LFI โ command injection โ pswm decrypt โ sudo full root
|
| Lame | Easy | โ Done | ![]() | View | View chain โถ
Samba usermap exploit โ SYSTEM shell
|
| Blue | Easy | โ Done | ![]() | View | View chain โถ
EternalBlue MS17-010 โ SYSTEM shell
|
| Optimum | Easy | โ Done | ![]() | View | View chain โถ
Rejetto HFS RCE โ SYSTEM with local tools
|
| Bashed | Easy | โ Done | ![]() | View | View chain โถ
Web fuzzing โ PHP webshell โ privesc via script abuse
|
| Chemistry | Easy | โ Done | ![]() | View | View chain โถ
File parser RCE โ LFI โ SSH key reuse
|
| Headless | Easy | โ Done | ![]() | View | View chain โถ
Blind XSS โ cookie theft โ command injection โ root
|
| Alert | Easy | โ Done | ![]() | View | View chain โถ
Markdown XSS โ LFI โ group permission privesc
|
| Writeup | Easy | โ Done | ![]() | View | View chain โถ
CMS Made Simple SQLi โ creds for jkr โ PATH hijack via fake run-parts โ root user injection โ root.txt
|
| Bastion | Easy | โ Done | ![]() | View | View chain โถ
SMB VHD โ extract SAM+SYSTEM โ crack creds โ SSH as l4mpje โ mRemoteNG config decrypt โ Admin creds โ root.txt
|
| Starting Point (Tier 0โ2) | Varied | โ Done | ![]() | โ | View chain โถ
Fundamental HTB boxes covering web, SMB, SSH, JWT, privesc, and enumeration techniques โ perfect for new pentesters
|
Retired tally: 30 boxes โ โ 30 completed ยท ๐ฉ 19 easy ยท ๐จ 9 medium ยท ๐ฅ 1 hard ยท ๐๏ธ 1 varied
๐ HTB Active Boxes
โ ๏ธ Write-ups withheld per HTB rules until box retirement. Proof screenshots demonstrate completion without revealing solutions.
| Machine | Difficulty | Status | Proof | Writeup | Summary |
|---|---|---|---|---|---|
| AirTouch | Medium | โ Done |
|
View |
View chain โถSNMP credential disclosure โ SSH access to consultant VLAN โ WPA2-PSK handshake capture and crack โ pivot to tablet management VLAN โ web application file upload to RCE โ credential harvesting from configuration files โ evil twin attack against WPA2-Enterprise network โ MSCHAPv2 hash capture and crack โ access to corporate VLAN โ plaintext credential extraction from hostapd authentication database โ privilege escalation to root.
|
| Browsed | Medium | โ Done |
|
View |
View chain โถBrowser extension upload mechanism โ client-side code execution in developer context โ SSRF to localhost-only services โ command injection via arithmetic evaluation in shell conditionals โ Python bytecode cache poisoning to achieve root privilege escalation.
|
| Overwatch | Medium | โ Done |
|
View |
View chain โถGuest SMB access reveals .NET monitoring application โ hardcoded MSSQL credentials in configuration โ linked server enumeration discovers unreachable SQL07 โ Active Directory DNS write permissions enable DNS poisoning โ MITM attack captures cleartext credentials via Responder โ WinRM access to domain โ localhost WCF service discovery โ reverse engineer SOAP contract from decompiled binary โ PowerShell command injection in KillProcess method โ SYSTEM shell.
|
| HackNet | Hard | โ Done |
|
View |
View chain โถSSTI + IDOR foothold โ world-writable Django cache โ pickle RCE โ GPG-encrypted DB backup โ root.
|
| Soulmate | Easy | โ Done |
|
View |
View chain โถSubdomain discovery โ CrushFTP CVE-2025-31161 โ admin access โ PHP webshell โ SSH creds โ Erlang shell โ root
|
| WhiteRabbit | Insane | โ Done |
|
View |
View chain โถSubdomain/service breadcrumbing โ signed-webhook foothold โ automation assist โ backup workflow pivot โ time-seeded randomness insight โ final
|
| DarkCorp | Insane | โณ Active |
|
View |
View chain โถTeaser only โ enterprise-style chain with careful web recon, internal pivoting, and identity-centric steps (no spoilers).
|
| Guardian | Hard | โ Done |
|
View |
View chain โถPortal creds โ SSH jamil โ confs abuse โ sudo safeapache2ctl โ rootbash โ root
|
| Previous | Medium | โณ Active |
|
View |
View chain โถTeaser โ modern web/API challenge; careful boundary checks and clean Linux escalation habits. Full write-up unlocks on retirement.
|
| CodeTwo | Easy | โณ Active |
|
View |
View chain โถTeaser โ modern web app; targeted enum, boundary reading, and Linux privesc mindset. Full write-up unlocks on retirement.
|
| Planning | Easy | โ Done |
|
View |
View chain โถSubdomain โ Grafana RCE โ docker escape โ SUID privesc
|
| Nocturnal | Easy | โ Done |
|
View |
View chain โถFile leak โ admin panel RCE โ DB hash โ SSH โ CVE โ root
|
| Environment | Medium | โ Done |
|
View |
View chain โถLaravel env bypass โ avatar RCE โ vault โ sudo abuse
|
Active tally: 13 boxes โ โ 10 completed ยท ๐ฉ 4 easy ยท ๐จ 5 medium ยท ๐ฅ 2 hard ยท ๐ช 2 insane
๐ข HTB Pro Labs
Multi-machine enterprise environments simulating real-world corporate networks, AD forests, and complex attack chains.
| Lab | Tier | Status | Proof | Link | Notes |
|---|---|---|---|---|---|
| Zephyr | Pro Lab | Completed |
|
View |
View notes โถPerimeter foothold โ multi-segment pivots โ internal tooling abuse โ AD enumeration โ domain takeover.
|
| Offshore | Pro Lab | Completed |
|
View |
View notes โถPerimeter recon โ chained web footholds โ pivots across segmented networks โ AD enumeration/abuse โ domain takeover.
|
| FullHouse | Mini Pro Lab | Completed |
|
View |
View notes โถSource review โ web โ AD โ reversing โ AI/chain โ fun glue lab.
|
| Solar | Mini Pro Lab | Completed |
|
View |
View notes โถEnumeration โ situational awareness โ FreeBSD exploitation โ out-of-band data exfiltration โ source code review โ tight, chain-heavy lab.
|
| APTLabs | Pro Lab | Completed |
|
View |
View notes โถExternal foothold โ web โ AD pivot โ ACL abuse โ DCSync โ domain takeover.
|
| Cybernetics | Pro Lab | Completed |
|
View |
View notes โถWeb foothold โ Kerberoast/AS-REP โ constrained delegation โ lateral movement โ DA.
|
| Dante | Pro Lab | Completed |
|
View |
View notes โถPerimeter โ Linux/Windows mixed estate โ credential reuse โ AD escalation โ DA.
|
| Fortress AWS | Pro Lab | Completed |
|
View |
View notes โถIAM misconfigs โ privilege escalation โ S3/SSM pivoting โ data exfil โ persistence.
|
| P.O.O | Pro Lab | Completed |
|
View |
View notes โถSMB/SQL exposure โ xp_cmdshell โ potato to SYSTEM โ AD pathing โ DA.
|
| RastaLabs | Pro Lab | Completed |
|
View |
View notes โถClassic AD: password spray โ AS-REP/Kerberoast โ BloodHound path โ DCSync.
|
| Wanderer | Pro Lab | Completed |
|
View |
View notes โถWeb foothold โ container/segmentation escape โ AD pivot โ privesc chain โ DA.
|
ProLabs tally: 11 boxes โ โ 11 completed ยท ๐ฉ 0 easy ยท ๐จ 0 medium ยท ๐ฅ 0 hard
๐ Other Platforms
Penetration testing practice across TryHackMe, ProvingGrounds, and other offensive security platforms.
๐งช Proving Grounds (PG) Boxes
| Box | Difficulty | Status | Proof | Link | Notes |
|---|---|---|---|---|---|
| Twiggy | Easy | โ Done | ![]() |
View | View notes โถSaltStack CVE-2020-11652 RCE โ Root Shell
|
| ClamAV | Easy | โ Done | ![]() |
View | View notes โถSNMP leaks clamav-milter โ CVE-2007-4560 Sendmail RCE โ inetd shell โ Root
|
| Mice | Easy | โ Done | ![]() |
View | View notes โถRemoteMouse 3.008 RCE โ FileZilla creds โ GUI LPE to SYSTEM
|
๐งช TryHackMe (THM) Boxes
| Box | Difficulty | Status | Proof | Link | Notes |
|---|---|---|---|---|---|
| FusionCorp | Hard | โ Done | ![]() |
View | View notes โถ/backup leak โ AS-REP roast (lparker) โ crack โ LDAP desc creds (jmurphy) โ Evil-WinRM โ SeBackupPrivilege (Backup Operators) โ Diskshadow VSS โ NTDS dump โ Administrator hash โ wmiexec โ root
|
| Ledger | Hard | โ Done | ![]() |
View | View notes โถLDAP creds in description โ Password spray (CHANGEME2023!) โ RDP foothold โ ADCS ESC1 abuse via Certipy โ Pivot to BRADLEY_ORTIZ โ PsExec โ DA shell
|
| Services | Medium | โ Done | ![]() |
View | View notes โถUser enum from website โ Kerbrute โ AS-REP roast (j.rock) โ WinRM โ Server Operators service abuse โ SYSTEM
|
| LazyAdmin | Easy | โ Done | ![]() |
View | View notes โถ/SweetRice /content/inc backup leak โ MD5 crack (manager) โ /content/as admin โ PHP upload โ webshell โ sudo perl backup.pl โ overwrite /etc/copy.sh โ root
|
| ArchAngel | Easy | โ Done | ![]() |
View | View notes โถ/LFI on /test.php?view= โ Apache log poisoning via User-Agent โ RCE (www-data) โ cron overwrite /opt/helloworld.sh โ SUID PATH hijack ( ~/secret/backup calls cp ) โ root
|
| Attacktive Directory | Easy | โ Done | ![]() |
View | View notes โถKerbrute userenum โ AS-REP roast โ SMB loot โ backup creds โ RDP โ secretsdump โ psexec โ root.txt
|
| VulnNet: Roasted | Easy | โ Done | ![]() |
View | View notes โถSMB enum โ AS-REP roast โ user shell via WinRM โ SYSVOL creds โ DA hash dump โ root.txt
|
| Corp | Easy | โ Done | ![]() |
View | View notes โถAppLocker bypass โ Kerberoast โ crack hash โ find creds in unattended.xml โ psexec as Administrator
|
๐งช HackSmarter Labs
| Box | Difficulty | Status | Proof | Link | Notes |
|---|---|---|---|---|---|
| BuildingMagic | Medium | โ Done | ![]() |
View | View notes โถAS-REP/Kerberoast โ foothold โ BloodHound path โ DA
|
| ShareThePain | Medium | โ Done | ![]() |
View | View notes โถMSSQL exec โ SYSTEM (potato) โ copy root.txt; optional ligolo-ng pivot
|
| PivotSmarter | Basic | โ Done | ![]() |
View | View notes โถSOCKS/TUN pivots (ligolo-ng/chisel) โ internal subnet enum โ multi-hop routes โ AD reachability & lateral movement
|
๐ Featured Case Study
VPN Compromise & Privilege Escalation
Structured penetration test case study demonstrating attack methodology from external reconnaissance through full host compromise, written from a defensive perspective.
Attack Chain:
- Enumeration: IKE Aggressive Mode discovery on VPN endpoint
- Credential Recovery: PSK extraction and offline cracking
- Initial Access: VPN authentication with recovered credentials
- Privilege Escalation: Sudo misconfiguration leading to root
Defensive Insights:
- MITRE ATT&CK mapping for detection engineering
- Risk ratings and business impact assessment
- Remediation guidance and compensating controls
- Detection opportunities at each attack stage
๐ฏ Why Red Team Skills Matter for Blue Team Roles
My offensive security background directly strengthens defensive capabilities:
Attack Detection
Understanding how attacks work enables creation of accurate detection rules and SIEM queries
Threat Hunting
Knowledge of attacker TTPs informs proactive hunting hypotheses and investigation priorities
Incident Response
Experience with exploitation chains accelerates incident analysis and containment decisions
Security Training
Practical attack knowledge enables realistic tabletop exercises and security awareness training
Current Focus: Applying offensive security knowledge to SOC analyst workflows through LetsDefend investigations, TryHackMe blue team paths, and hands-on SIEM lab work. Seeking SOC L1/Security Operations roles in Melbourne where this perspective strengthens defensive capabilities.
๐ก Note on Active Boxes: Per HTB community guidelines, write-ups are only published after box retirement. Proof screenshots demonstrate completion without revealing solutions. Full methodologies and detailed write-ups are available for all retired boxes in my GitHub repository.
๐ฌ Discuss Offensive Security Techniques
Interested in discussing attack methodologies, defensive applications, or collaboration opportunities?
Get In Touch โ











































