Posts

My First Blog Post

Welcome to my new blog! This is my first post using Hugo.

Why Hugo?

Hugo is fast, flexible, and perfect for technical blogs…

What’s Next?

I’ll be writing about…

c c cxxvcxc

Deep Dive: SQL Injection Vulnerability Analysis
Deep Dive: SQL Injection …

SQL injection remains one of the most critical web application vulnerabilities. In this post, I’ll walk through a real-world SQL injection discovery, exploitation, and remediation.

Background

During a recent penetration testing engagement, I discovered a second-order SQL injection …

Hack The Box: Writer Machine Writeup
Hack The Box: Writer …

Writer is a medium-difficulty Linux machine on Hack The Box that teaches valuable lessons about SQL injection, authentication bypass, and Linux privilege escalation.

Machine Information

  • Name: Writer
  • OS: Linux
  • Difficulty: Medium
  • Points: 30
  • Release Date: July 31, 2021

Reconnaissance

Nmap Scan

nmap …

SOC 2 Audit Preparation: A Complete Guide
SOC 2 Audit Preparation: …

Completing your first SOC 2 Type II audit can seem daunting. After successfully leading my organization through the process with zero findings, I’m sharing the complete playbook.

What is SOC 2?

SOC 2 (Service Organization Control 2) is a compliance framework developed by AICPA that evaluates …

Automating Security Operations with Python
Automating Security …

Manual security tasks are time-consuming and error-prone. In this guide, I’ll share practical Python automation scripts I use daily to streamline security operations.

Why Automate Security Tasks?

Benefits:

  • Speed: Automated tasks run in seconds vs hours
  • 🎯 Consistency: Same process every …

Breaking Into Cybersecurity in 2024: A Practical Roadmap
Breaking Into …

After mentoring dozens of aspiring cybersecurity professionals, I’ve identified the most effective paths into the field. Here’s everything I wish someone had told me when I started.

The Cybersecurity Landscape

Main Career Paths

PathFocusEntry …