m8secActive Directory ACL Abuse with Kali LinuxActive Directory Access Control Lists (ACL), and their associated Access Control Entries (ACE), define the entities and permissions of a…May 10May 10
m8secinInfoSec Write-upsGame Hacking: Hex Editing Save Files for Unlimited CashAfter creating a Batocera live USB for retro gaming, I instantly started down the path of game hacking and researching how ROM’s (digital…Aug 10, 2023Aug 10, 2023
m8secinInfoSec Write-upsDecoding the Airwaves: Tracking Device Movements With WiFiPhoto by Ken Friis Larsen on UnsplashJun 29, 2023Jun 29, 2023
m8secinInfoSec Write-upsPythonic Malware Part-2: Reversing Python ExecutablesIn Pythonic Malware Part-1, I demonstrated how Python executables can be used to bypass Windows Defender and successfully launch…Apr 22, 20221Apr 22, 20221
m8secinInfoSec Write-upsPythonic Malware: Evading Detection with Compiled ExecutablesCreating Python executables during an offensive security engagement used to be an effective method of evasion. However, this tactic has…Apr 11, 20221Apr 11, 20221
m8secinInfoSec Write-upsExploiting Password Reset PoisoningTo date, one of my most lucrative bug bounties came from a password reset poisoning vulnerability. This post walks through the process of…Nov 13, 2021Nov 13, 2021
m8secinPython in Plain EnglishExecuting Shell Commands in PythonA comparison of methods, functions, and output.Nov 8, 20211Nov 8, 20211
m8secinJavaScript in Plain EnglishImplementing Client-Side Templates with jQueryMaintaining the code base on your own personal blog or website can be a great learning experience. It teaches you about the design and…Apr 3, 2021Apr 3, 2021
m8secinInfoSec Write-upsIntro to Bug Bounty Automation: Tool Chaining with BashFeb 17, 2021Feb 17, 2021
m8secinInfoSec Write-upsHacking Organizations One Document at a Time With MetadataMetadata is simply defined as data about data. In computer systems, this is used to correctly interpret files and store descriptive…Feb 3, 2021Feb 3, 2021