Hi 👋

I, write random stuff, currently I’m tring to write some writeups

Responder

HTB - Responder This is my write-up on solving the Responder machine from Hack The Box. Even though this is listed very easy and is on the Starting Point series, and it taught me some new and really interesting concepts about Windows authentication and NTLM hashes. First Look I started with the usual Nmap scan and found two open ports: 80 (HTTP) and 5985. Port 80 was expected, but 5985 was new to me. A quick Google search revealed it’s the WinRM (Windows Remote Management) port - basically Windows’ answer to SSH for remote PowerShell access. ...

February 10, 2026 Â· 4 min

Tasting Juice

Scratching the Web In my last post, I wrote about solving a CTF that required reading C code and learning about Linux file descriptors (FDs). In this one, I’m writing about when I tried OWASP Juice Shop, an intentionally vulnerable web app for training and learning. These early challenges are mostly meant to make you familiar with the basics: HTTP requests, what the browser blocks versus what the server enforces, how client-side and server-side validation differ, and where simple mistakes show up in real apps. ...

January 6, 2026 Â· 8 min

Baby Steps

fd - pwnable.kr As I’m exploring cybersecurity during my semester break, this is my first write-up on solving a cybersecurity challenge. I tried to solve the first challange in pwnable.kr: fd Below is my thought process from when I solved it. Setup The challenge provides SSH creds to connect to a server: ssh fd@pwnable.kr -p2222 Let’s SSH into it. Inspection Running ls after SSHing in reveals three files: fd, fd.c, and flag. Clearly we’re expected to read what’s inside that flag file. ...

December 29, 2025 Â· 4 min