Footprinting

Intro Enumeration blends passive discovery with active validation. OSINT stays passive and should be treated apart. The objective is a clean map of exposure, not access. Enumeration Principles We ask why something is visible and what it implies about the target, then compare that with what is missing or hidden to avoid assumption driven decisions. Multiple viewpoints reduce blind spots by forcing you to compare independent signals before deciding what to probe. Visible facts outweigh assumptions because they can be verified and repeated under the same conditions. More context improves accuracy and keeps the test focused on the most relevant assets and interfaces. Enumeration Methodology We use six layers to structure external work. The layers move from public presence to OS setup. This keeps testing organized. ...

December 24, 2025 · 7 min

Network Analysis and Scanning

Introduction Network enumeration is the phase where you discover what is reachable, what is listening, and how a system responds to probes. This is where you build a map of the target and decide which services are worth deeper testing. A clean approach saves time, reduces noise, and prevents the test from stalling later. The goal is not just to find open ports, but to understand how each service behaves and what it reveals. ...

December 24, 2025 · 7 min

Linux & Bash Fundamentals for Security (Inspired by OverTheWire)

Overview While practicing Linux fundamentals through OverTheWire-style wargames, I built a set of notes and small scripts focused on understanding how Linux systems behave from a security and attacker-observer perspective. This post does not contain level solutions or flags. Instead, it documents concepts, techniques, and automation patterns that are directly applicable to: penetration testing, CTF-style challenges, and real-world Linux enumeration. The goal is to show how to think, not what to solve. ...

December 23, 2025 · 3 min

Vulnerability Assesment

Security Assessments Security assessments identify weaknesses in systems and processes. They provide evidence so teams can patch, mitigate, or remove risk. Clear scope and objectives keep the assessment useful and safe. Reports should be actionable for both technical and business teams. Security Assessment Overview Most assessments look for vulnerabilities, but depth varies by type. Some are checklist driven while others simulate real attacks. The choice depends on regulations, risk tolerance, and resources. Understanding the differences prevents mismatched expectations. ...

December 24, 2025 · 16 min

Web Reconnaissance

Intro Web reconnaissance is the foundation of a strong security test. It maps assets and technology choices before deeper testing begins and reduces blind spots. Types of Recon Recon uses two approaches: active and passive. Active touches systems directly, while passive relies on public sources. Active Recon Active recon interacts with the target to gather accurate data. It is effective but increases detection risk because requests are logged by servers and security tools. ...

December 24, 2025 · 6 min