In
The lodge (environments, testlabs, and tools used)
Falconry (information gathering, initial port scanning)
Lay of the land (enumeration)
A foothold in the cloud (attack infrastructure as code)
A pocketful of acorns (physical attacks)
A canopy of apple-blossom (web application hacking)
API mayhem (hacking APIs)
Head in the clouds (hacking cloud applications)
Riches in the ground (network attacks)
A vast amphibious wilderness of swamp and forest (IoT)
Through
The grove (for a simplified impression)
Smithing (shellcoding, exploitation and escalation)
Hidden messages (steganography)
Nature's cheats (evasion techniques)
Beyond the readable (cryptanalysis)
Cracking nuts (reverse engineering)
Waterfalls (buffer overflow exploits)
Forest fire (a red teaming trail)
Mythical blue lake (Active Directory hacks)
Out
Gathering edibles (data exfiltration)
Hunting bug bounties (bbh)
Red team
Ty Myrddin Home
Unseen University
Improbability Blog
About
Contact
Index