Posts
My First Blog Post
Welcome to my new blog! This is my first post using Hugo.
Why Hugo?
Hugo is fast, flexible, and perfect for technical blogs…
What’s Next?
I’ll be writing about…
c c cxxvcxc
Deep Dive: SQL Injection …
SQL injection remains one of the most critical web application vulnerabilities. In this post, I’ll walk through a real-world SQL injection discovery, exploitation, and remediation.
Background
During a recent penetration testing engagement, I discovered a second-order SQL injection …
Hack The Box: Writer …
Writer is a medium-difficulty Linux machine on Hack The Box that teaches valuable lessons about SQL injection, authentication bypass, and Linux privilege escalation.
Machine Information
- Name: Writer
- OS: Linux
- Difficulty: Medium
- Points: 30
- Release Date: July 31, 2021
Reconnaissance
Nmap Scan
nmap …SOC 2 Audit Preparation: …
Completing your first SOC 2 Type II audit can seem daunting. After successfully leading my organization through the process with zero findings, I’m sharing the complete playbook.
What is SOC 2?
SOC 2 (Service Organization Control 2) is a compliance framework developed by AICPA that evaluates …
Automating Security …
Manual security tasks are time-consuming and error-prone. In this guide, I’ll share practical Python automation scripts I use daily to streamline security operations.
Why Automate Security Tasks?
Benefits:
- ⚡ Speed: Automated tasks run in seconds vs hours
- 🎯 Consistency: Same process every …
Breaking Into …
After mentoring dozens of aspiring cybersecurity professionals, I’ve identified the most effective paths into the field. Here’s everything I wish someone had told me when I started.
The Cybersecurity Landscape
Main Career Paths
| Path | Focus | Entry … |
|---|




