Blog

Actively writing about technology, life-events and indie hacking. Here are some of my most recent thoughts and hacks I've published.

Blog Post Cover Image
aws cli burpsuite

Proxying the AWS CLI through Burp Suite.

In this post, I walk you through how to configure the AWS CLI to proxy all its requests through Burp Suite. It's an exciting way to learn how the CLI works internally or could be helpful when debugging a weird edge case.

Blog Post Cover Image
linux containers devops

Where's dig

Nowadays, it is relatively common to find a stripped-down docker container. While great to save precious bytes on hard drives, this might complicate things when you quickly need to debug something. This post explains how you can quickly install dig or nslookup within your container on different distros.

Blog Post Cover Image
hack-the-box writeup cap

Hack The Box - Cap

In this post, I'll go over Cap from Hack the Box. An easy level Linux machine where the name is nice hint. An IDOR gives access to a PCAP with unencrypted traffic and misconfigured capabilites allow getting a shell as root.

Blog Post Cover Image
hack-the-box writeup knife

Hack The Box - Knife

In this post, I'll go over Knife from Hack the Box. It's an easy level Linux machine that shows what damage a supply chain attack on the PHP codebase could have caused if it would have slipped through the cracks and got released into the wild.

Blog Post Cover Image
hack-the-box writeup laboratory

Hack The Box - Laboratory

In this post, I'll walk you through Laboratory, an easy-level Linux machine on Hack the Box. It has a GitLab CVE vulnerability for the user and uses path file checking on a setuid binary for the root flag.

Blog Post Cover Image
hack-the-box luanne netbsd

Hack The Box - Luanne

In this post I walk you through how I solved Luanne from Hack the Box. This is an easy difficulty NetBSD box, focussing on fuzzing and code injection via Lua.