Actively writing about technology, life-events and indie hacking. Here are some of my most recent thoughts and hacks I've published.

Where's dig

Nowadays, it is relatively common to find a stripped-down docker container. While great to save precious bytes on hard drives, this might complicate things when you quickly need to debug something. This post explains how you can quickly install dig or nslookup within your container on different distros.

3 min read

Add styling to an active link in Next.js

In this post I show how you can use router api to detect active link in Next.js

4 min read

Hack The Box - Cap

In this post, I'll go over Cap from Hack the Box. An easy level Linux machine where the name is nice hint. An IDOR gives access to a PCAP with unencrypted traffic and misconfigured capabilites allow getting a shell as root.

9 min read

Experimenting with the OMIGOD vulnerabilities!

Being able to experiment with vulnerabilities is crucial to gain a deeper understanding of them. In this post, we'll look at creating an environment with a vulnerable version of the OMI agent.

14 min read

Hack The Box - Knife

In this post, I'll go over Knife from Hack the Box. It's an easy level Linux machine that shows what damage a supply chain attack on the PHP codebase could have caused if it would have slipped through the cracks and got released into the wild.

7 min read

Hack The Box - Love

In this post, I'll walk you through Love, an easy-level Windows machine on Hack the Box.

10 min read

Hack The Box - Laboratory

In this post, I'll walk you through Laboratory, an easy-level Linux machine on Hack the Box. It has a GitLab CVE vulnerability for the user and uses path file checking on a setuid binary for the root flag.

13 min read

Hack The Box - Luanne

In this post I walk you through how I solved Luanne from Hack the Box. This is an easy difficulty NetBSD box, focussing on fuzzing and code injection via Lua.

16 min read

Monitor any command typed at a shell with eBPF

Ever wondered if it would be possible to monitor what is getting typed at other shells running on a Linux system. Well I have and in this post, I walk you through creating an eBPF program to monitor every command typed on a bash or zsh prompt.

13 min read