n0h3r04,320 Hours: Reflections on Six Months in InfoSecSix months ago, I was blessed with the opportunity to join a great company as an Information Security Analyst. It came when I least…Jan 10, 2023Jan 10, 2023
n0h3r0inSystem Weakness(THM CTF) How I Learned to Stop Worrying and Love The Exploit; OverpassThis box tests a bit of everything, from fuzzing, to webapp pentesting, to Linux process exploitation & privilege escalation. This is…Jul 9, 2022Jul 9, 2022
n0h3r0inSystem Weakness(THM) OWASP #3: This Data Has Feelings And That’s Okay; Sensitive Data Exposure (Part 2)If you haven’t yet, read Part 1 of this post here!Jul 1, 2022Jul 1, 2022
n0h3r0inSystem Weakness(THM) OWASP #3: This Data Has Feelings And That’s Okay; Sensitive Data Exposure (Part 1)Life has been a little crazy, with a demanding work schedule and now officially being offered an Information Security Analyst role that I…Jun 29, 2022Jun 29, 2022
n0h3r0inSystem Weakness(THM) — How I Met (and destroyed) Your Paywall; Walking an ApplicationI’m switching it up today from the OWASP material, but keeping up with the theme of webapp security (my current obsession) let’s check out…Jun 23, 2022Jun 23, 2022
n0h3r0inSystem Weakness(THM) OWASP #2: This Authentication Ain’t Right, This Whole Thing Ain’t Right!;Continuing on our OWASP adventure, let’s check out Broken Authentication.Jun 21, 2022Jun 21, 2022
n0h3r0inSystem WeaknessOWASP Top 10: #1 — InjectionThe only Top 10 list that actually f*cking matters.Jun 21, 2022Jun 21, 2022