Skip to content

Offensive Cybersecurity Specialist

YouTube page opens in new windowInstagram page opens in new window
Command Line Security
Web Security Training
Command Line Security
  • Web Security Training
  • Web Development
  • Blog
  • Contact
  • Web Security Training
  • Web Development
  • Blog
  • Contact

Blog

Aug172025
Blog An attacker discovers a padding vulnerability.

Breaking Crypto – Padding Oracle Attacks

BlogBy TrainerAugust 17, 2025Leave a comment

Overview This post presents a lab-based demonstration of a padding oracle attack targeting AES-CBC with PKCS#7 padding. The aim is…

Read more
Aug172025
Blog Attacker discovers that ECB is in use to generate password reset tokens.

Breaking Crypto – Known Plaintext Attack on ECB – Abuse Password Reset for Account Takeover

BlogBy TrainerAugust 17, 2025Leave a comment

OverviewThis write-up demonstrates a known-plaintext attack against AES-ECB within a controlled lab environment. It showcases how predictable password reset codes…

Read more
Aug172025
Blog

XXE in File Upload via Metadata

BlogBy TrainerAugust 17, 2025Leave a comment

OverviewThis post demonstrates an XML External Entity (XXE) injection in a lab environment through a .docx file upload. The purpose…

Read more
May272022
Blog

Mass Assignment – Understanding Web Security

BlogBy TrainerMay 27, 2022Leave a comment

Mass Assignment Mass Assignment is a vulnerability that occurs when the web application defines variables from user input, even if…

Read more
May232022
Blog

Evading FireEye EX Email Filtering with the Dirty Screen Attack

BlogBy TrainerMay 23, 2022Leave a comment

Timeline Reported to FireEye on May 7th FireEye confirmed receipt of the vulnerability disclosure and stated that it was already…

Read more
May232022
Blog

Using CA Process Automation to Get Command Execution as SYSTEM

BlogBy TrainerMay 23, 2022Leave a comment

On internal penetration tests, it is common to get a foothold using man-in-the-middle techniques such as Link-Local Multicast Name Resolution…

Read more
Command Line Security

Privacy Policy

Go to Top