<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Hacking Articles</title><description>A modern technical blog focused on hacking, security, and development.</description><link>https://havocx.me/</link><language>en-us</language><item><title>HTB DevArea Complete Writeup - CVE-2022-46364 Apache CXF LFI &amp; HoverFly RCE</title><link>https://havocx.me//pentesting/hackthebox/htb-devarea-complete-writeup--cve-2022-46364-apache-cxf-lfi--hoverfly-rce/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/htb-devarea-complete-writeup--cve-2022-46364-apache-cxf-lfi--hoverfly-rce/</guid><description>DevArea is a Medium-difficulty HackTheBox machine from Season 10 featuring an internal developer platform exposed across multiple services. The exploitation chain begins with anonymous FTP access to a leaked JAR file, which reveals an Apache CXF SOAP service vulnerable to a critical XOP/MTOM Local File Inclusion (CVE-2022-46364 / CVE-2022-46363). Reading the HoverFly systemd service file leaks admin credentials, which are used to authenticate against the HoverFly Admin API and obtain a JWT token. From there, a malicious middleware payload injected via the /api/v2/hoverfly/middleware endpoint delivers a reverse shell as dev_ryan. Privilege escalation to root exploits a world-writable /bin/bash binary combined with a sudo-permitted script to plant a root-owned SUID shell. This writeup provides a complete step-by-step walkthrough with detailed technical analysis of each exploitation stage.</description><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/devarea-feature-image.png&quot; alt=&quot;HTB DevArea Complete Writeup - CVE-2022-46364 Apache CXF LFI &amp; HoverFly RCE&quot; /&gt;&lt;/p&gt;&lt;p&gt;DevArea is a Medium-difficulty HackTheBox machine from Season 10 featuring an internal developer platform exposed across multiple services. The exploitation chain begins with anonymous FTP access to a leaked JAR file, which reveals an Apache CXF SOAP service vulnerable to a critical XOP/MTOM Local File Inclusion (CVE-2022-46364 / CVE-2022-46363). Reading the HoverFly systemd service file leaks admin credentials, which are used to authenticate against the HoverFly Admin API and obtain a JWT token. From there, a malicious middleware payload injected via the /api/v2/hoverfly/middleware endpoint delivers a reverse shell as dev_ryan. Privilege escalation to root exploits a world-writable /bin/bash binary combined with a sudo-permitted script to plant a root-owned SUID shell. This writeup provides a complete step-by-step walkthrough with detailed technical analysis of each exploitation stage.&lt;/p&gt;</content:encoded><category>hackthebox</category><category>htb</category><category>linux</category><category>cve-2022-46364</category><category>cve-2022-46363</category><category>apache-cxf</category><category>xop-mtom</category><category>lfi</category><category>local-file-inclusion</category><category>soap</category><category>jar-analysis</category><category>cfr-decompiler</category><category>hoverfly</category><category>jwt-authentication</category><category>middleware-injection</category><category>rce</category><category>command-injection</category><category>ftp-enumeration</category><category>anonymous-ftp</category><category>reverse-shell</category><category>privilege-escalation</category><category>world-writable-binary</category><category>suid-exploitation</category><category>sudo-abuse</category><category>bash-replacement</category><category>nmap</category><category>season10</category><category>medium-difficulty</category><enclosure url="https://havocx.me//images/devarea-feature-image.png" length="0" type="image/png"/></item><item><title>HTB Kobold Complete Writeup — CVE-2026-23744 MCP Inspector RCE &amp; Docker Escape</title><link>https://havocx.me//pentesting/hackthebox/htb-kobold-complete-writeup--cve-2026-23744-mcp-inspector-rce--docker-escape/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/htb-kobold-complete-writeup--cve-2026-23744-mcp-inspector-rce--docker-escape/</guid><description>Kobold is an Easy-difficulty HackTheBox machine from Season 10 built around modern AI tooling infrastructure. The attack chain begins with subdomain enumeration uncovering an MCPJam Inspector instance vulnerable to CVE-2026-23744 — a critical unauthenticated RCE in the /api/mcp/connect endpoint that allows arbitrary command execution via a crafted serverConfig payload. This delivers a reverse shell as the user ben. Privilege escalation exploits an implicit Docker group membership accessible via newgrp docker, which is leveraged to mount the host filesystem inside a root-running MySQL container and read the root flag directly — a textbook Docker socket escape. This writeup provides a complete step-by-step walkthrough with beginner-friendly explanations of each technique.</description><pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/kobold-feature-image.png&quot; alt=&quot;HTB Kobold Complete Writeup — CVE-2026-23744 MCP Inspector RCE &amp; Docker Escape&quot; /&gt;&lt;/p&gt;&lt;p&gt;Kobold is an Easy-difficulty HackTheBox machine from Season 10 built around modern AI tooling infrastructure. The attack chain begins with subdomain enumeration uncovering an MCPJam Inspector instance vulnerable to CVE-2026-23744 — a critical unauthenticated RCE in the /api/mcp/connect endpoint that allows arbitrary command execution via a crafted serverConfig payload. This delivers a reverse shell as the user ben. Privilege escalation exploits an implicit Docker group membership accessible via newgrp docker, which is leveraged to mount the host filesystem inside a root-running MySQL container and read the root flag directly — a textbook Docker socket escape. This writeup provides a complete step-by-step walkthrough with beginner-friendly explanations of each technique.&lt;/p&gt;</content:encoded><category>hackthebox</category><category>htb</category><category>linux</category><category>cve-2026-23744</category><category>mcp-inspector</category><category>mcpjam</category><category>unauthenticated-rce</category><category>remote-code-execution</category><category>subdomain-enumeration</category><category>ffuf</category><category>virtual-host-routing</category><category>reverse-shell</category><category>tty-upgrade</category><category>docker-escape</category><category>docker-group</category><category>volume-mount</category><category>privilege-escalation</category><category>newgrp</category><category>chroot</category><category>nmap</category><category>privatebin</category><category>nginx</category><category>season10</category><category>easy-difficulty</category><enclosure url="https://havocx.me//images/kobold-feature-image.png" length="0" type="image/png"/></item><item><title>The Hacker&apos;s Guide to Not Burning Out: Mental Health in Cybersecurity</title><link>https://havocx.me//blog/the-hackers-guide-to-not-burning-out-mental-health-in-cybersecurity/</link><guid isPermaLink="true">https://havocx.me//blog/the-hackers-guide-to-not-burning-out-mental-health-in-cybersecurity/</guid><description>Burnout is endemic in cybersecurity. 84% of professionals report experiencing it, 50% expect to burn out within 12 months, and job satisfaction is at an all-time low. This honest, research-backed guide covers the real causes of hacker burnout, how to recognize it before it wrecks you, and actionable strategies that actually work - from a community that&apos;s finally starting to talk about it openly.</description><pubDate>Fri, 27 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/burnout-650.webp&quot; alt=&quot;The Hacker&apos;s Guide to Not Burning Out: Mental Health in Cybersecurity&quot; /&gt;&lt;/p&gt;&lt;p&gt;Burnout is endemic in cybersecurity. 84% of professionals report experiencing it, 50% expect to burn out within 12 months, and job satisfaction is at an all-time low. This honest, research-backed guide covers the real causes of hacker burnout, how to recognize it before it wrecks you, and actionable strategies that actually work - from a community that&apos;s finally starting to talk about it openly.&lt;/p&gt;</content:encoded><category>MentalHealth</category><category>Burnout</category><category>Cybersecurity</category><category>CareerAdvice</category><category>Wellbeing</category><category>Chitchat</category><category>Community</category><category>hacking</category><enclosure url="https://havocx.me//images/burnout-650.webp" length="0" type="image/webp"/></item><item><title>50 Hacker Jokes So Bad They&apos;re Actually Good (Guaranteed to Make Your Teammates Groan)</title><link>https://havocx.me//chitchat/50-hacker-jokes-so-bad-theyre-actually-good-guaranteed-to-make-your-teammates-groan/</link><guid isPermaLink="true">https://havocx.me//chitchat/50-hacker-jokes-so-bad-theyre-actually-good-guaranteed-to-make-your-teammates-groan/</guid><description>Sometimes you just need to laugh. 50 carefully curated hacker, CTF, pentesting, and infosec jokes - ranging from clean puns to certified groan-worthy dad jokes. Organized by category for maximum damage. Share with your team. Lose friends. Worth it.</description><pubDate>Fri, 27 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/ChatGPT Image Mar 27, 2026, 03_26_02 PM.png&quot; alt=&quot;50 Hacker Jokes So Bad They&apos;re Actually Good (Guaranteed to Make Your Teammates Groan)&quot; /&gt;&lt;/p&gt;&lt;p&gt;Sometimes you just need to laugh. 50 carefully curated hacker, CTF, pentesting, and infosec jokes - ranging from clean puns to certified groan-worthy dad jokes. Organized by category for maximum damage. Share with your team. Lose friends. Worth it.&lt;/p&gt;</content:encoded><category>Fun</category><category>Jokes</category><category>Humor</category><category>Hacking</category><category>CTF</category><category>Pentesting</category><category>Community</category><category>Chitchat</category><enclosure url="https://havocx.me//images/ChatGPT Image Mar 27, 2026, 03_26_02 PM.png" length="0" type="image/png"/></item><item><title>Vibe Hacking Explained: How AI Is Letting Complete Beginners Launch Real Attacks</title><link>https://havocx.me//blog/vibe-hacking-explained-how-ai-is-letting-complete-beginners-launch-real-attacks/</link><guid isPermaLink="true">https://havocx.me//blog/vibe-hacking-explained-how-ai-is-letting-complete-beginners-launch-real-attacks/</guid><description>Vibe hacking is the dark twin of vibe coding - using AI tools to launch cyberattacks without needing to understand how they work. With verified real-world incidents including a Moltbook breach exposing 1.5 million tokens and Claude AI being used to run full extortion campaigns, this deep-dive covers exactly what vibe hacking is, how it works, and how defenders need to adapt in 2026.</description><pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/Vibe-Hacking-Featured.webp&quot; alt=&quot;Vibe Hacking Explained: How AI Is Letting Complete Beginners Launch Real Attacks&quot; /&gt;&lt;/p&gt;&lt;p&gt;Vibe hacking is the dark twin of vibe coding - using AI tools to launch cyberattacks without needing to understand how they work. With verified real-world incidents including a Moltbook breach exposing 1.5 million tokens and Claude AI being used to run full extortion campaigns, this deep-dive covers exactly what vibe hacking is, how it works, and how defenders need to adapt in 2026.&lt;/p&gt;</content:encoded><category>VibeHacking</category><category>VibeCoding</category><category>AI</category><category>Cybersecurity</category><category>Malware</category><category>AIThreats</category><category>BeginnerHackers</category><category>blog</category><category>Chitchat</category><enclosure url="https://havocx.me//images/Vibe-Hacking-Featured.webp" length="0" type="image/webp"/></item><item><title>litellm Supply Chain Attack (March 2026): How TeamPCP Backdoored a PyPI Package Used by Millions</title><link>https://havocx.me//blog/litellm-supply-chain-attack-march-2026-how-teampcp-backdoored-a-pypi-package-used-by-millions/</link><guid isPermaLink="true">https://havocx.me//blog/litellm-supply-chain-attack-march-2026-how-teampcp-backdoored-a-pypi-package-used-by-millions/</guid><description>On March 24, 2026, threat actor TeamPCP published two backdoored versions of litellm to PyPI, affecting developers who installed v1.82.7 or v1.82.8 during a 3-hour window. This is a verified, technical breakdown of exactly how the attack happened, what the malware did, how to check if you&apos;re affected, and what it means for supply chain security going forward.</description><pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/a-timeline-of-the-teampcp-attacks-trivy-checkmarx-more-v0-pSYUkNcPFcPpJtxG2a3Om91IAE5r4Q3loLWSUE3Yet4.webp&quot; alt=&quot;litellm Supply Chain Attack (March 2026): How TeamPCP Backdoored a PyPI Package Used by Millions&quot; /&gt;&lt;/p&gt;&lt;p&gt;On March 24, 2026, threat actor TeamPCP published two backdoored versions of litellm to PyPI, affecting developers who installed v1.82.7 or v1.82.8 during a 3-hour window. This is a verified, technical breakdown of exactly how the attack happened, what the malware did, how to check if you&apos;re affected, and what it means for supply chain security going forward.&lt;/p&gt;</content:encoded><category>SupplyChain</category><category>TeamPCP</category><category>litellm</category><category>PyPI</category><category>CVE-2026-33634</category><category>Malware</category><category>CICDSecurity</category><category>Python</category><category>Trivy</category><category>Incident</category><category>hackers</category><enclosure url="https://havocx.me//images/a-timeline-of-the-teampcp-attacks-trivy-checkmarx-more-v0-pSYUkNcPFcPpJtxG2a3Om91IAE5r4Q3loLWSUE3Yet4.webp" length="0" type="image/webp"/></item><item><title>SQL Injection Is Not Dead: Modern SQLi Techniques That Still Work in 2026</title><link>https://havocx.me//pentesting/web/sql-injection-modern-sqli-techniques-2026/</link><guid isPermaLink="true">https://havocx.me//pentesting/web/sql-injection-modern-sqli-techniques-2026/</guid><description>SQL injection has been &apos;dead&apos; for over a decade - and it keeps not dying. This practical 2026 guide covers why SQLi persists, the modern techniques that bypass modern defenses, real CVEs that prove it still works against production applications, tool-based and manual methodology, and WAF evasion approaches used in current bug bounty and penetration testing work.</description><pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/sql-injection-is-not-dead.png&quot; alt=&quot;SQL Injection Is Not Dead: Modern SQLi Techniques That Still Work in 2026&quot; /&gt;&lt;/p&gt;&lt;p&gt;SQL injection has been &apos;dead&apos; for over a decade - and it keeps not dying. This practical 2026 guide covers why SQLi persists, the modern techniques that bypass modern defenses, real CVEs that prove it still works against production applications, tool-based and manual methodology, and WAF evasion approaches used in current bug bounty and penetration testing work.&lt;/p&gt;</content:encoded><category>Websecurity</category><category>SQLInjection</category><category>BugBounty</category><category>Pentesting</category><category>WAFBypass</category><category>OWASP</category><category>WebApplications</category><category>SQLMap</category><category>hacking</category><category>web</category><enclosure url="https://havocx.me//images/sql-injection-is-not-dead.png" length="0" type="image/png"/></item><item><title>AI-Powered OSINT in 2026: How Machine Learning Is Changing the Way We Investigate</title><link>https://havocx.me//osint/ai-powered-osint-in-2026-how-machine-learning-is-changing-the-way-we-investigate/</link><guid isPermaLink="true">https://havocx.me//osint/ai-powered-osint-in-2026-how-machine-learning-is-changing-the-way-we-investigate/</guid><description>AI and machine learning have transformed open-source intelligence from a slow, manual discipline into a real-time, automated powerhouse. This deep-dive covers the tools, real scenarios, techniques, and ethical lines every OSINT investigator must understand in 2026.</description><pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/Open-Source-Intel.png&quot; alt=&quot;AI-Powered OSINT in 2026: How Machine Learning Is Changing the Way We Investigate&quot; /&gt;&lt;/p&gt;&lt;p&gt;AI and machine learning have transformed open-source intelligence from a slow, manual discipline into a real-time, automated powerhouse. This deep-dive covers the tools, real scenarios, techniques, and ethical lines every OSINT investigator must understand in 2026.&lt;/p&gt;</content:encoded><category>OSINT</category><category>AI</category><category>MachineLearning</category><category>Investigation</category><category>Cybersecurity</category><category>ThreatIntelligence</category><category>SwarmIntelligence</category><category>PredictiveAnalysis</category><category>opensource intelligence</category><enclosure url="https://havocx.me//images/Open-Source-Intel.png" length="0" type="image/png"/></item><item><title>One Username, Entire Identity: How OSINT Investigators Build Full Profiles From Almost Nothing</title><link>https://havocx.me//osint/one-username-entire-identity-how-osint-investigators-build-full-profiles-from-almost-nothing/</link><guid isPermaLink="true">https://havocx.me//osint/one-username-entire-identity-how-osint-investigators-build-full-profiles-from-almost-nothing/</guid><description>Most people use the same username everywhere. That single habit is an OSINT investigator&apos;s greatest gift. This step-by-step guide walks through the complete methodology for building a full identity profile from a single username — using free tools, real scenarios, and techniques used by law enforcement, journalists, and security researchers in 2026.</description><pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/username-lookup.avif&quot; alt=&quot;One Username, Entire Identity: How OSINT Investigators Build Full Profiles From Almost Nothing&quot; /&gt;&lt;/p&gt;&lt;p&gt;Most people use the same username everywhere. That single habit is an OSINT investigator&apos;s greatest gift. This step-by-step guide walks through the complete methodology for building a full identity profile from a single username — using free tools, real scenarios, and techniques used by law enforcement, journalists, and security researchers in 2026.&lt;/p&gt;</content:encoded><category>OSINT</category><category>Username</category><category>Investigation</category><category>Sherlock</category><category>DigitalFootprint</category><category>Profiling</category><category>CTF</category><category>opensource intelligence</category><enclosure url="https://havocx.me//images/username-lookup.avif" length="0" type="image/*"/></item><item><title>AI is Now Your Biggest Enemy in CTFs - Here&apos;s How to Fight Back</title><link>https://havocx.me//blog/ai-is-now-your-biggest-enemy-in-ctfs--heres-how-to-fight-back/</link><guid isPermaLink="true">https://havocx.me//blog/ai-is-now-your-biggest-enemy-in-ctfs--heres-how-to-fight-back/</guid><description>AI agents are solving CTF challenges faster than human experts in 2026. This opinion piece breaks down what that means for your skills, your career, and how to stay relevant as a hacker in the age of agentic AI.</description><pubDate>Tue, 24 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/what-is-agentic-ai-framework.jpg&quot; alt=&quot;AI is Now Your Biggest Enemy in CTFs - Here&apos;s How to Fight Back&quot; /&gt;&lt;/p&gt;&lt;p&gt;AI agents are solving CTF challenges faster than human experts in 2026. This opinion piece breaks down what that means for your skills, your career, and how to stay relevant as a hacker in the age of agentic AI.&lt;/p&gt;</content:encoded><category>Blog</category><category>AI</category><category>Opinion</category><category>Chitchat</category><category>Cybersecurity 2026</category><category>Agentic AI</category><category>Workflow</category><category>Artificial Intelligence</category><category>Capture the flag</category><category>Cybersecurity</category><category>Hacking</category><enclosure url="https://havocx.me//images/what-is-agentic-ai-framework.jpg" length="0" type="image/jpeg"/></item><item><title>From Zero to Root: A Beginner&apos;s Complete Guide to Solving HTB Easy Machines in 2026</title><link>https://havocx.me//blog/from-zero-to-root-a-beginners-complete-guide-to-solving-htb-easy-machines-in-2026/</link><guid isPermaLink="true">https://havocx.me//blog/from-zero-to-root-a-beginners-complete-guide-to-solving-htb-easy-machines-in-2026/</guid><description>New to Hack The Box? This complete 2026 beginner&apos;s guide walks you through every step — from setting up your VPN to rooting your first Easy machine. Tools, methodology, tips, and real examples inside.</description><pubDate>Tue, 24 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/htb.avif&quot; alt=&quot;From Zero to Root: A Beginner&apos;s Complete Guide to Solving HTB Easy Machines in 2026&quot; /&gt;&lt;/p&gt;&lt;p&gt;New to Hack The Box? This complete 2026 beginner&apos;s guide walks you through every step — from setting up your VPN to rooting your first Easy machine. Tools, methodology, tips, and real examples inside.&lt;/p&gt;</content:encoded><category>HackTheBox</category><category>HTB</category><category>CTF</category><category>Beginner</category><category>Pentesting</category><category>Root</category><category>Ethical Hacking</category><category>Root</category><category>Hackthebox</category><category>HTB</category><enclosure url="https://havocx.me//images/htb.avif" length="0" type="image/*"/></item><item><title>How to Write a CTF Writeup That Gets 10,000 Views (SEO + Structure Guide)</title><link>https://havocx.me//blog/how-to-write-a-ctf-writeup-that-gets-10000-views-seo--structure-guide/</link><guid isPermaLink="true">https://havocx.me//blog/how-to-write-a-ctf-writeup-that-gets-10000-views-seo--structure-guide/</guid><description>Want your CTF writeup to actually get read? This complete guide covers SEO, structure, storytelling, images, and the #1 reason most writeups get zero traffic — and how to fix it.</description><pubDate>Tue, 24 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/9e44ea2e00aa461db11569767dbf1748.jpeg&quot; alt=&quot;How to Write a CTF Writeup That Gets 10,000 Views (SEO + Structure Guide)&quot; /&gt;&lt;/p&gt;&lt;p&gt;Want your CTF writeup to actually get read? This complete guide covers SEO, structure, storytelling, images, and the #1 reason most writeups get zero traffic — and how to fix it.&lt;/p&gt;</content:encoded><category>WriteUp</category><category>Blogging</category><category>SEO</category><category>Documentation</category><category>TryHackMe</category><category>Career</category><category>Documenting</category><category>Documentation</category><category>Google indexing</category><category>Blog</category><category>storytelling</category><enclosure url="https://havocx.me//images/9e44ea2e00aa461db11569767dbf1748.jpeg" length="0" type="image/jpeg"/></item><item><title>HTB VariaType Complete Writeup — CVE-2025-66034 &amp; Font Exploitation</title><link>https://havocx.me//pentesting/hackthebox/htb-variatype-complete-writeup/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/htb-variatype-complete-writeup/</guid><description>VariaType is a cutting-edge HackTheBox machine from Season 10 featuring a web-based variable font generator. The exploitation chain involves chaining three critical vulnerabilities—fontTools CVE-2025-66034 for initial webshell creation, FontForge CVE-2024-25081 for lateral privilege escalation to the steve user, and a setuptools PackageIndex path traversal vulnerability for root access. This writeup provides complete step-by-step instructions with detailed technical analysis of each exploit mechanism.</description><pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/variatype-feature-image.png&quot; alt=&quot;HTB VariaType Complete Writeup — CVE-2025-66034 &amp; Font Exploitation&quot; /&gt;&lt;/p&gt;&lt;p&gt;VariaType is a cutting-edge HackTheBox machine from Season 10 featuring a web-based variable font generator. The exploitation chain involves chaining three critical vulnerabilities—fontTools CVE-2025-66034 for initial webshell creation, FontForge CVE-2024-25081 for lateral privilege escalation to the steve user, and a setuptools PackageIndex path traversal vulnerability for root access. This writeup provides complete step-by-step instructions with detailed technical analysis of each exploit mechanism.&lt;/p&gt;</content:encoded><category>hackthebox</category><category>htb</category><category>linux</category><category>cve-2025-66034</category><category>fonttools</category><category>font-processing</category><category>xml-injection</category><category>arbitrary-file-write</category><category>rce</category><category>cve-2024-25081</category><category>fontforge</category><category>zip-command-injection</category><category>setuptools</category><category>path-traversal</category><category>php-webshell</category><category>privilege-escalation</category><category>ssh-key-injection</category><category>python-exploits</category><category>nmap</category><category>git-enumeration</category><category>cron-exploitation</category><category>sudo-abuse</category><category>season10</category><category>medium-difficulty</category><enclosure url="https://havocx.me//images/variatype-feature-image.png" length="0" type="image/png"/></item><item><title>CCTV HackTheBox Writeup — Season 10 Linux Machine Walkthrough</title><link>https://havocx.me//pentesting/hackthebox/cctv-hackthebox-season10-machine-writeup/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/cctv-hackthebox-season10-machine-writeup/</guid><description>A comprehensive walkthrough of the CCTV machine from HackTheBox Season 10. This Medium-difficulty Linux machine writeup covers ZoneMinder default credentials, exploiting CVE-2024-51482 SQL injection to extract and crack bcrypt hashes, leveraging a tcpdump Linux capability to sniff plaintext credentials from Docker network traffic, SSH port forwarding to expose an internal MotionEye instance, and achieving root via CVE-2025-60787 remote code execution using Metasploit. A must-read for penetration testers tackling multi-step Linux exploitation chains.</description><pubDate>Sun, 08 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/cctv-feature-image.png&quot; alt=&quot;CCTV HackTheBox Writeup — Season 10 Linux Machine Walkthrough&quot; /&gt;&lt;/p&gt;&lt;p&gt;A comprehensive walkthrough of the CCTV machine from HackTheBox Season 10. This Medium-difficulty Linux machine writeup covers ZoneMinder default credentials, exploiting CVE-2024-51482 SQL injection to extract and crack bcrypt hashes, leveraging a tcpdump Linux capability to sniff plaintext credentials from Docker network traffic, SSH port forwarding to expose an internal MotionEye instance, and achieving root via CVE-2025-60787 remote code execution using Metasploit. A must-read for penetration testers tackling multi-step Linux exploitation chains.&lt;/p&gt;</content:encoded><category>hackthebox</category><category>htb</category><category>cctv</category><category>linux</category><category>zoneminder</category><category>motioneye</category><category>sql-injection</category><category>sqli</category><category>cve-2024-51482</category><category>cve-2025-60787</category><category>hackthebox-writeup</category><category>htb-writeup</category><category>machine-writeup</category><category>active-machine</category><category>season-10</category><category>htb-season10</category><category>medium-difficulty</category><category>ctf</category><category>penetration-testing</category><category>ethical-hacking</category><category>privilege-escalation</category><category>lateral-movement</category><category>enumeration</category><category>exploitation</category><category>red-team</category><category>offensive-security</category><category>infosec</category><category>cybersecurity</category><category>hacking</category><category>pentesting</category><category>network-sniffing</category><category>tcpdump</category><category>capability-abuse</category><category>linux-capabilities</category><category>docker</category><category>docker-network</category><category>ssh-port-forwarding</category><category>metasploit</category><category>sqlmap</category><category>hashcat</category><category>bcrypt</category><category>rce</category><category>remote-code-execution</category><category>video-surveillance</category><category>camera-security</category><category>linux-privilege-escalation</category><category>credential-sniffing</category><category>default-credentials</category><category>apache</category><category>php</category><category>mysql</category><enclosure url="https://havocx.me//images/cctv-feature-image.png" length="0" type="image/png"/></item><item><title>Pirate HackTheBox Writeup — Complete Season 10 Machine Walkthrough</title><link>https://havocx.me//pentesting/hackthebox/pirate-hackthebox-season10-machine-writeup/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/pirate-hackthebox-season10-machine-writeup/</guid><description>A comprehensive walkthrough of the Pirate machine from HackTheBox Season 10. This Hard-difficulty Windows machine writeup covers initial access with provided credentials, Active Directory enumeration, lateral movement strategies, privilege escalation techniques, and achieving SYSTEM access. Learn how to compromise this challenging HTB Windows machine with detailed methodology, practical command examples, and SEO-optimized content for cybersecurity professionals.</description><pubDate>Wed, 04 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/pirate-feature-image.png&quot; alt=&quot;Pirate HackTheBox Writeup — Complete Season 10 Machine Walkthrough&quot; /&gt;&lt;/p&gt;&lt;p&gt;A comprehensive walkthrough of the Pirate machine from HackTheBox Season 10. This Hard-difficulty Windows machine writeup covers initial access with provided credentials, Active Directory enumeration, lateral movement strategies, privilege escalation techniques, and achieving SYSTEM access. Learn how to compromise this challenging HTB Windows machine with detailed methodology, practical command examples, and SEO-optimized content for cybersecurity professionals.&lt;/p&gt;</content:encoded><category>hackthebox</category><category>htb</category><category>pirate</category><category>windows</category><category>active-directory</category><category>hackthebox-pirate</category><category>htb-pirate</category><category>hackthebox-writeup</category><category>htb-writeup</category><category>machine-writeup</category><category>active-machine</category><category>season-10</category><category>htb-season10</category><category>hard-difficulty</category><category>ctf</category><category>penetration-testing</category><category>ethical-hacking</category><category>privilege-escalation</category><category>enumeration</category><category>exploitation</category><category>red-team</category><category>offensive-security</category><category>infosec</category><category>cybersecurity</category><category>hacking</category><category>pentesting</category><category>vulnerability-assessment</category><category>security-research</category><category>windows-pentesting</category><category>network-security</category><category>domain-enumeration</category><category>lateral-movement</category><category>post-exploitation</category><category>credential-dumping</category><category>bloodhound</category><category>kerberos</category><category>smb-enumeration</category><category>powershell</category><category>windows-privilege-escalation</category><category>active-directory</category><category>ad</category><category>adcs</category><category>bloodhound</category><category>bloodyad</category><category>certipy</category><category>coerce</category><category>coercion</category><category>delegation</category><category>forcechangepassword</category><category>getst-py</category><category>htb</category><category>impacket</category><category>kcd</category><category>kerberos</category><category>ldap</category><category>ligolo-ng</category><category>netexec</category><category>ntlm</category><category>ntlm-relay</category><category>ntlmrelayx</category><category>ntlmrelayx-py</category><category>pass-the-certificate</category><category>pre2k</category><category>protocol-transition</category><category>rbcd</category><category>s4u2proxy</category><category>s4u2self</category><category>shadow-credentials</category><category>smb</category><category>spn</category><category>windows</category><category>winrm</category><category>writespn</category><enclosure url="https://havocx.me//images/pirate-feature-image.png" length="0" type="image/png"/></item><item><title>Interpretor HackTheBox Writeup — Complete Machine Walkthrough</title><link>https://havocx.me//pentesting/hackthebox/interpretor-hackthebox-writeup/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/interpretor-hackthebox-writeup/</guid><description>A comprehensive walkthrough of the Interpretor machine from HackTheBox. This writeup covers reconnaissance, enumeration techniques, initial foothold exploitation, lateral movement strategies, and privilege escalation to root. Learn how to compromise this challenging HTB machine with detailed methodology and practical command examples.</description><pubDate>Mon, 23 Feb 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/card-image-interpretor.png&quot; alt=&quot;Interpretor HackTheBox Writeup — Complete Machine Walkthrough&quot; /&gt;&lt;/p&gt;&lt;p&gt;A comprehensive walkthrough of the Interpretor machine from HackTheBox. This writeup covers reconnaissance, enumeration techniques, initial foothold exploitation, lateral movement strategies, and privilege escalation to root. Learn how to compromise this challenging HTB machine with detailed methodology and practical command examples.&lt;/p&gt;</content:encoded><category>hackthebox</category><category>htb</category><category>Mirth Connect</category><category>PBKDF2</category><category>CVE-2023-43208</category><category>interpretor</category><category>hackthebox-interpretor</category><category>htb-interpretor</category><category>hackthebox-writeup</category><category>htb-writeup</category><category>machine-writeup</category><category>active-machine</category><category>ctf</category><category>penetration-testing</category><category>ethical-hacking</category><category>privilege-escalation</category><category>enumeration</category><category>exploitation</category><category>red-team</category><category>offensive-security</category><category>infosec</category><category>cybersecurity</category><category>hacking</category><category>pentesting</category><category>vulnerability-assessment</category><category>security-research</category><category>htb-season</category><category>linux-pentesting</category><category>network-security</category><enclosure url="https://havocx.me//images/card-image-interpretor.png" length="0" type="image/png"/></item><item><title>BITSCTF 2026 Writeup — Jetpack Drift &amp; Radio Telescope</title><link>https://havocx.me//ctf/2026-02-21-bitsctf-2026-writeup/</link><guid isPermaLink="true">https://havocx.me//ctf/2026-02-21-bitsctf-2026-writeup/</guid><description>Full BITSCTF 2026 writeup covering the Jetpack Drift and Radio Telescope challenges. Includes PCAP triage with tshark, AES-CTR rolling-key decryption, hash chain reconstruction, ICO/PNG extraction, OCR flag reading, and signal anomaly detection — with complete Python exploit scripts and step-by-step methodology for competitive CTF players.</description><pubDate>Sun, 22 Feb 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/scoreboard.png&quot; alt=&quot;BITSCTF 2026 Writeup — Jetpack Drift &amp; Radio Telescope&quot; /&gt;&lt;/p&gt;&lt;p&gt;Full BITSCTF 2026 writeup covering the Jetpack Drift and Radio Telescope challenges. Includes PCAP triage with tshark, AES-CTR rolling-key decryption, hash chain reconstruction, ICO/PNG extraction, OCR flag reading, and signal anomaly detection — with complete Python exploit scripts and step-by-step methodology for competitive CTF players.&lt;/p&gt;</content:encoded><category>ctf</category><category>writeup</category><category>bitsctf</category><category>bitsctf-2026</category><category>web-exploitation</category><category>cryptography</category><category>reverse-engineering</category><category>forensics</category><category>pcap-analysis</category><category>aes-ctr</category><category>hash-chaining</category><category>tshark</category><category>python</category><category>signal-analysis</category><category>cybersecurity</category><category>ethical-hacking</category><enclosure url="https://havocx.me//images/scoreboard.png" length="0" type="image/png"/></item><item><title>FrameOS: Effortless Screenshot Framing for Developers and Designers</title><link>https://havocx.me//blog/2026-02-20-frameos-effortless-screenshot-framing-for-developers-and-designers/</link><guid isPermaLink="true">https://havocx.me//blog/2026-02-20-frameos-effortless-screenshot-framing-for-developers-and-designers/</guid><description>FrameOS is a free, browser-based tool that transforms raw screenshots into polished, professional mockups using modern OS frames. It features batch processing, exact App Store dimensions, and entirely client-side execution to ensure your images remain secure and private.</description><pubDate>Sat, 21 Feb 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/frameos_marketing_card.png&quot; alt=&quot;FrameOS: Effortless Screenshot Framing for Developers and Designers&quot; /&gt;&lt;/p&gt;&lt;p&gt;FrameOS is a free, browser-based tool that transforms raw screenshots into polished, professional mockups using modern OS frames. It features batch processing, exact App Store dimensions, and entirely client-side execution to ensure your images remain secure and private.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/frameos_marketing_card.png" length="0" type="image/png"/></item><item><title>Digital Hearts: Navigating Romance in the Age of AI and Algorithms</title><link>https://havocx.me//blog/2026-02-18-digital-hearts-navigating-romance-in-the-age-of-ai-and-algorithms/</link><guid isPermaLink="true">https://havocx.me//blog/2026-02-18-digital-hearts-navigating-romance-in-the-age-of-ai-and-algorithms/</guid><description>Explore the evolving landscape of modern love, from the complexities of dating apps to the rise of AI companions. Discover real-life stories, psychological impacts, and future trends in digital intimacy</description><pubDate>Thu, 19 Feb 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/1001124284.png&quot; alt=&quot;Digital Hearts: Navigating Romance in the Age of AI and Algorithms&quot; /&gt;&lt;/p&gt;&lt;p&gt;Explore the evolving landscape of modern love, from the complexities of dating apps to the rise of AI companions. Discover real-life stories, psychological impacts, and future trends in digital intimacy&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/1001124284.png" length="0" type="image/png"/></item><item><title>0xFUN CTF 2026: Global Jeopardy-Style Cybersecurity Challenge</title><link>https://havocx.me//ctf/0xfun-ctf-writeup/</link><guid isPermaLink="true">https://havocx.me//ctf/0xfun-ctf-writeup/</guid><description>0xFUN CTF 2026 is a 48-hour online Capture The Flag competition that pits teams and individual players against a series of mixed-difficulty cybersecurity challenges across web exploitation, reverse engineering, cryptography, forensics, OSINT and more. Built to be both approachable for beginners and deep enough to challenge intermediate competitors, this event emphasizes hands-on learning, creative problem-solving, and practical exploitation techniques in a high-pressure, competitive format that mirrors real offensive security work.</description><pubDate>Sun, 15 Feb 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/oxfun-card-image.png&quot; alt=&quot;0xFUN CTF 2026: Global Jeopardy-Style Cybersecurity Challenge&quot; /&gt;&lt;/p&gt;&lt;p&gt;0xFUN CTF 2026 is a 48-hour online Capture The Flag competition that pits teams and individual players against a series of mixed-difficulty cybersecurity challenges across web exploitation, reverse engineering, cryptography, forensics, OSINT and more. Built to be both approachable for beginners and deep enough to challenge intermediate competitors, this event emphasizes hands-on learning, creative problem-solving, and practical exploitation techniques in a high-pressure, competitive format that mirrors real offensive security work.&lt;/p&gt;</content:encoded><category>ctf</category><category>writeup</category><category>reverse-engineering</category><category>crypto</category><category>0xfun-ctf</category><category>writeup</category><category>cybersecurity</category><category>reverse-engineering</category><category>binary-exploitation</category><category>cryptography</category><category>discrete-logarithm</category><category>aes</category><category>mersenne-twister</category><category>lcg</category><category>prng</category><category>sigrok</category><category>memory-forensics</category><category>steganography</category><category>osint</category><category>network-forensics</category><category>linux-privilege-escalation</category><category>suid</category><category>acl</category><category>ssh</category><category>digital-forensics</category><category>pcap-analysis</category><category>python</category><category>rust</category><category>vulnerability-analysis</category><enclosure url="https://havocx.me//images/oxfun-card-image.png" length="0" type="image/png"/></item><item><title>WingData HackTheBox Walkthrough – Season 10 Full Exploit &amp; Root Guide</title><link>https://havocx.me//pentesting/hackthebox/wingdata-hackthebox-machine-writeup/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/wingdata-hackthebox-machine-writeup/</guid><description>WingData is a HackTheBox Season 10 machine that challenges players with realistic enumeration, service exploitation, and privilege escalation techniques. This walkthrough breaks down the full attack chain from initial reconnaissance to root, with clear commands and practical reasoning for each step.</description><pubDate>Sun, 15 Feb 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/feature-image-wingdata.png&quot; alt=&quot;WingData HackTheBox Walkthrough – Season 10 Full Exploit &amp; Root Guide&quot; /&gt;&lt;/p&gt;&lt;p&gt;WingData is a HackTheBox Season 10 machine that challenges players with realistic enumeration, service exploitation, and privilege escalation techniques. This walkthrough breaks down the full attack chain from initial reconnaissance to root, with clear commands and practical reasoning for each step.&lt;/p&gt;</content:encoded><category>htb</category><category>hackthebox</category><category>wingdata</category><category>season 10</category><category>easy</category><category>htb walkthrough</category><category>penetration testing</category><category>enumeration</category><category>nmap</category><category>ftp</category><category>wing ftp server</category><category>web exploitation</category><category>CVE-2025-47812</category><category>lua injection</category><category>null byte vulnerability</category><category>metasploit</category><category>meterpreter</category><category>hash cracking</category><category>hashcat</category><category>sha256</category><category>salted hashes</category><category>rockyou</category><category>ssh</category><category>privilege escalation</category><category>linux privilege escalation</category><category>CVE-2025-4517</category><category>python tarfile</category><category>path traversal</category><category>symlink attack</category><category>tar exploitation</category><category>backup exploitation</category><category>sudo misconfiguration</category><category>authorized_keys</category><category>ssh key injection</category><category>cybersecurity</category><category>ethical hacking</category><category>active machine</category><enclosure url="https://havocx.me//images/feature-image-wingdata.png" length="0" type="image/png"/></item><item><title>Hack The Box Sorcery Writeup (Season 8) – Complete Walkthrough | Insane Linux Machine</title><link>https://havocx.me//pentesting/hackthebox/sorcery-hackthebox-writeup/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/sorcery-hackthebox-writeup/</guid><description>Sorcery is a Medium difficulty Linux machine from Hack The Box Season 8 that focuses on web application exploitation, misconfigurations, and privilege escalation techniques. In this walkthrough, we perform full reconnaissance, identify the attack surface, exploit vulnerabilities to gain initial access, and escalate privileges to root. This guide breaks down every phase of the attack chain with practical methodology and command examples, making it ideal for penetration testers, red teamers, and HTB players preparing for real-world scenarios.</description><pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/sorcery-htb-season8_banner.png&quot; alt=&quot;Hack The Box Sorcery Writeup (Season 8) – Complete Walkthrough | Insane Linux Machine&quot; /&gt;&lt;/p&gt;&lt;p&gt;Sorcery is a Medium difficulty Linux machine from Hack The Box Season 8 that focuses on web application exploitation, misconfigurations, and privilege escalation techniques. In this walkthrough, we perform full reconnaissance, identify the attack surface, exploit vulnerabilities to gain initial access, and escalate privileges to root. This guide breaks down every phase of the attack chain with practical methodology and command examples, making it ideal for penetration testers, red teamers, and HTB players preparing for real-world scenarios.&lt;/p&gt;</content:encoded><category>hackthebox</category><category>htb</category><category>hackthebox</category><category>htb</category><category>sorcery</category><category>hackthebox-sorcery</category><category>htb-sorcery</category><category>hackthebox-season-8</category><category>htb-season-8</category><category>season8</category><category>medium-machine</category><category>linux-machine</category><category>htb-linux</category><category>hackthebox-writeup</category><category>htb-writeup</category><category>ctf-writeup</category><category>privilege-escalation</category><category>web-exploitation</category><category>penetration-testing</category><category>red-team</category><category>cybersecurity</category><category>ethical-hacking</category><enclosure url="https://havocx.me//images/sorcery-htb-season8_banner.png" length="0" type="image/png"/></item><item><title>Pterodactyl Hack The Box Write-Up-Medium Linux Machine Walkthrough</title><link>https://havocx.me//pentesting/hackthebox/hackthebox-pterodactyl-season10-machine-writeup/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/hackthebox-pterodactyl-season10-machine-writeup/</guid><description>This write-up covers the full compromise of the Pterodactyl machine from Hack The Box, a Medium-difficulty Linux challenge. It walks through initial reconnaissance, service enumeration, vulnerability discovery, exploitation paths, and the privilege escalation techniques required to achieve root access. Ideal for penetration testers and CTF players looking to sharpen real-world Linux exploitation skills and structured attack methodology.</description><pubDate>Mon, 09 Feb 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/preview-pteforlly-image.png&quot; alt=&quot;Pterodactyl Hack The Box Write-Up-Medium Linux Machine Walkthrough&quot; /&gt;&lt;/p&gt;&lt;p&gt;This write-up covers the full compromise of the Pterodactyl machine from Hack The Box, a Medium-difficulty Linux challenge. It walks through initial reconnaissance, service enumeration, vulnerability discovery, exploitation paths, and the privilege escalation techniques required to achieve root access. Ideal for penetration testers and CTF players looking to sharpen real-world Linux exploitation skills and structured attack methodology.&lt;/p&gt;</content:encoded><category>htb</category><category>hackthebox</category><category>linux</category><category>medium</category><category>pterodactyl</category><category>privilege-escalation</category><category>enumeration</category><category>exploitation</category><category>penetration-testing</category><category>ctf</category><category>writeup</category><enclosure url="https://havocx.me//images/preview-pteforlly-image.png" length="0" type="image/png"/></item><item><title>Facts Hack The Box Writeup-Sudo Privilege Escalation via Facter (Linux)</title><link>https://havocx.me//pentesting/hackthebox/facts-hackthebox-season10-machine-writeup/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/facts-hackthebox-season10-machine-writeup/</guid><description>In this walkthrough of the Facts machine from Hack The Box, we exploit a misconfigured sudo rule allowing the execution of Facter as root. By abusing Facter&apos;s --custom-dir option, we load a malicious Ruby fact file that executes with UID 0. Instead of spawning an unstable shell, we apply the SetUID bit to /bin/bash, gaining a persistent root shell via bash -p. This writeup covers enumeration, attack reasoning, exploitation mechanics, and a clean privilege escalation path to root.</description><pubDate>Sun, 01 Feb 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/feature-image-facts.png&quot; alt=&quot;Facts Hack The Box Writeup-Sudo Privilege Escalation via Facter (Linux)&quot; /&gt;&lt;/p&gt;&lt;p&gt;In this walkthrough of the Facts machine from Hack The Box, we exploit a misconfigured sudo rule allowing the execution of Facter as root. By abusing Facter&apos;s --custom-dir option, we load a malicious Ruby fact file that executes with UID 0. Instead of spawning an unstable shell, we apply the SetUID bit to /bin/bash, gaining a persistent root shell via bash -p. This writeup covers enumeration, attack reasoning, exploitation mechanics, and a clean privilege escalation path to root.&lt;/p&gt;</content:encoded><category>htb</category><category>Linux</category><category>htb</category><category>hackthebox</category><category>facts</category><category>linux</category><category>linux-privilege-escalation</category><category>sudo-misconfiguration</category><category>facter</category><category>ruby</category><category>setuid</category><category>bash</category><category>infosec</category><category>pentesting</category><category>facter-exploit</category><category>ruby-exploitation</category><category>custom-facts</category><category>command-execution</category><category>setuid</category><category>setuid-bash</category><category>bash</category><category>root</category><category>root-shell</category><category>misconfiguration</category><category>security-misconfiguration</category><category>local-privilege-escalation</category><category>red-team</category><category>offensive-security</category><category>pentesting</category><category>ctf</category><category>infosec</category><category>cybersecurity</category><category>linux-security</category><enclosure url="https://havocx.me//images/feature-image-facts.png" length="0" type="image/png"/></item><item><title>Conversor Hack The Box Writeup &amp; Walkthrough (XSLT Injection, Linux PrivEsc)</title><link>https://havocx.me//pentesting/hackthebox/conversor-hackthebox-season9-machine-walkthrough/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/conversor-hackthebox-season9-machine-walkthrough/</guid><description>Step-by-step Conversor Hack The Box walkthrough covering XSLT injection, remote code execution, reverse shell via cron jobs, SQLite credential extraction, SSH access, and Linux privilege escalation using CVE-2024-48990 (needrestart). Ideal for penetration testers, red teamers, and CTF players seeking real-world Linux exploitation techniques.</description><pubDate>Fri, 30 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/conversor-htb-season9_banner.png&quot; alt=&quot;Conversor Hack The Box Writeup &amp; Walkthrough (XSLT Injection, Linux PrivEsc)&quot; /&gt;&lt;/p&gt;&lt;p&gt;Step-by-step Conversor Hack The Box walkthrough covering XSLT injection, remote code execution, reverse shell via cron jobs, SQLite credential extraction, SSH access, and Linux privilege escalation using CVE-2024-48990 (needrestart). Ideal for penetration testers, red teamers, and CTF players seeking real-world Linux exploitation techniques.&lt;/p&gt;</content:encoded><category>hackthebox</category><category>htb</category><category>linux</category><category>xslt-injection</category><category>rce</category><category>sqlite</category><category>credential-harvesting</category><category>cronjob-exploitation</category><category>needrestart</category><category>cve-2024-48990</category><category>privilege-escalation</category><category>penetration-testing</category><category>walkthrough</category><category>writeup</category><category>cybersecurity</category><category>ethical-hacking</category><category>penetration-testing-tutorial</category><category>linux-ctf</category><category>hacking-guide</category><category>security-research</category><category>exploit-development</category><category>infosec</category><category>bug-bounty</category><category>CTF</category><category>hacking-tools</category><category>vulnerability</category><category>reverse-shell</category><category>privilege-escalation-linux</category><enclosure url="https://havocx.me//images/conversor-htb-season9_banner.png" length="0" type="image/png"/></item><item><title>Signed Hack The Box Writeup &amp; Walkthrough (Windows, AD CS, Certificate Abuse)</title><link>https://havocx.me//pentesting/hackthebox/signed-hackthebox-season9-machine-writeup/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/signed-hackthebox-season9-machine-writeup/</guid><description>Step-by-step Signed Hack The Box walkthrough covering Windows enumeration, Active Directory Certificate Services (AD CS) abuse, certificate-based authentication attacks, lateral movement, and privilege escalation to SYSTEM. Ideal for penetration testers, red teamers, and CTF players focusing on modern Active Directory attack paths.</description><pubDate>Fri, 30 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/signed-htb-season9_banner.png&quot; alt=&quot;Signed Hack The Box Writeup &amp; Walkthrough (Windows, AD CS, Certificate Abuse)&quot; /&gt;&lt;/p&gt;&lt;p&gt;Step-by-step Signed Hack The Box walkthrough covering Windows enumeration, Active Directory Certificate Services (AD CS) abuse, certificate-based authentication attacks, lateral movement, and privilege escalation to SYSTEM. Ideal for penetration testers, red teamers, and CTF players focusing on modern Active Directory attack paths.&lt;/p&gt;</content:encoded><category>hackthebox</category><category>htb</category><category>windows</category><category>active-directory</category><category>ad-cs</category><category>certificate-abuse</category><category>authentication-bypass</category><category>kerberos</category><category>lateral-movement</category><category>privilege-escalation</category><category>red-teaming</category><category>penetration-testing</category><category>walkthrough</category><category>writeup</category><category>cybersecurity</category><category>ethical-hacking</category><category>penetration-testing-tutorial</category><category>windows-ctf</category><category>hacking-guide</category><category>security-research</category><category>exploit-development</category><category>infosec</category><category>bug-bounty</category><category>CTF</category><category>hacking-tools</category><category>vulnerability</category><category>ad-cs-abuse</category><category>certificate-authentication</category><category>domain-compromise</category><category>windows-privilege-escalation</category><category>ntlm-relay</category><category>silver-ticket</category><category>kerberos-abuse</category><enclosure url="https://havocx.me//images/signed-htb-season9_banner.png" length="0" type="image/png"/></item><item><title>NICC 2026 CTF - Namibia International Cybersecurity Conference  Write-Up</title><link>https://havocx.me//ctf/2026-01-28-nicc-2026-ctf-namibia-international-cybersecurity-conference-write-up/</link><guid isPermaLink="true">https://havocx.me//ctf/2026-01-28-nicc-2026-ctf-namibia-international-cybersecurity-conference-write-up/</guid><description>This write-up documents my full solution path for the NICC CTF 2026, covering all challenge categories including OSINT, Web, Reverse Engineering, PWN, and Industrial Control Systems (ICS).
Rather than focusing only on final answers, this write-up emphasizes methodology, attacker mindset, and real-world exploitation logic -from open-source intelligence gathering and web vulnerability chaining to low-level binary analysis and Modbus/TCP memory disclosure in simulated industrial environments.</description><pubDate>Thu, 29 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/namibiafeatureimage.png&quot; alt=&quot;NICC 2026 CTF - Namibia International Cybersecurity Conference  Write-Up&quot; /&gt;&lt;/p&gt;&lt;p&gt;This write-up documents my full solution path for the NICC CTF 2026, covering all challenge categories including OSINT, Web, Reverse Engineering, PWN, and Industrial Control Systems (ICS).
Rather than focusing only on final answers, this write-up emphasizes methodology, attacker mindset, and real-world exploitation logic -from open-source intelligence gathering and web vulnerability chaining to low-level binary analysis and Modbus/TCP memory disclosure in simulated industrial environments.&lt;/p&gt;</content:encoded><category>ctf</category><category>writeup</category><category>CTF Writeup</category><category>NICC CTF</category><category>Capture The Flag</category><category>Cybersecurity</category><category>Ethical Hacking</category><category>OSINT</category><category>Web Exploitation</category><category>PWN</category><category>ICS Security</category><category>Modbus TCP</category><category>OT SecurityReverse Engineering</category><category>Binary Exploitation</category><category>ICS Security</category><category>Industrial Control Systems</category><category>Modbus TCP</category><category>OT Security</category><enclosure url="https://havocx.me//images/namibiafeatureimage.png" length="0" type="image/png"/></item><item><title>Hercules HackTheBox Writeup &amp; Walkthrough (Active Directory, Windows, PrivEsc)</title><link>https://havocx.me//pentesting/hackthebox/hercules-hackthebox/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/hercules-hackthebox/</guid><description>Step-by-step Hercules HackTheBox walkthrough for 2026. Learn enumeration, Windows and Active Directory exploitation, privilege escalation, and CTF skills. Ideal for penetration testers, red teamers, and cybersecurity enthusiasts seeking real-world attack paths and solutions.</description><pubDate>Sun, 25 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/hercules-htb-season9_banner.png&quot; alt=&quot;Hercules HackTheBox Writeup &amp; Walkthrough (Active Directory, Windows, PrivEsc)&quot; /&gt;&lt;/p&gt;&lt;p&gt;Step-by-step Hercules HackTheBox walkthrough for 2026. Learn enumeration, Windows and Active Directory exploitation, privilege escalation, and CTF skills. Ideal for penetration testers, red teamers, and cybersecurity enthusiasts seeking real-world attack paths and solutions.&lt;/p&gt;</content:encoded><category>htb</category><category>windows</category><category>kerberos</category><category>nxc</category><category>smb</category><category>ffuf</category><category>shortscan</category><category>kerbrute</category><category>seclists</category><category>awk</category><category>tee</category><category>ldap injection</category><category>lfi</category><category>bloodhound</category><category>dotnet</category><category>aspxauth cookie</category><category>file upload</category><category>dll</category><category>AvaloniaILSpy</category><category>dnSpy</category><category>odt</category><category>certipy-ad</category><category>responder</category><category>bloodyAD</category><category>powerview</category><category>forcechangepassword</category><category>hackthebox writeup</category><category>pentest walkthrough</category><category>active directory</category><category>privilege escalation</category><category>CTF</category><category>infosec</category><category>cybersecurity</category><category>penetration testing</category><category>windows exploitation</category><category>red teaming</category><category>enumeration</category><category>hacking tutorial</category><category>walkthrough</category><category>security blog</category><category>genericall</category><category>writedacl</category><category>allowedtoact</category><category>genericwrite</category><category>rusthound-ce</category><category>bloodhound-python</category><category>getTGT</category><category>esc3</category><category>rbcd</category><category>winrmexec</category><category>S4U2self</category><category>U2U</category><category>S4U2proxy</category><category>secretsdump</category><enclosure url="https://havocx.me//images/hercules-htb-season9_banner.png" length="0" type="image/png"/></item><item><title>HTB Fries-complete Writeup</title><link>https://havocx.me//pentesting/hackthebox/htb-fries-complete-writeup/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/htb-fries-complete-writeup/</guid><description>Fries is a full enterprise-style attack chain where a leaked pgAdmin credential leads to Docker RCE, NFS loot, LDAP credential capture, and finally AD CS (ESC6 + ESC16) abuse to forge an Administrator certificate. It&apos;s a complete pivot-through-every-layer machine ending in total domain compromise.</description><pubDate>Mon, 19 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/pwnedfries.png&quot; alt=&quot;HTB Fries-complete Writeup&quot; /&gt;&lt;/p&gt;&lt;p&gt;Fries is a full enterprise-style attack chain where a leaked pgAdmin credential leads to Docker RCE, NFS loot, LDAP credential capture, and finally AD CS (ESC6 + ESC16) abuse to forge an Administrator certificate. It&apos;s a complete pivot-through-every-layer machine ending in total domain compromise.&lt;/p&gt;</content:encoded><category>htb</category><category>windows</category><category>nmap</category><category>pwm</category><category>evil-winrm</category><category>smb</category><category>nxc</category><category>rdate</category><category>ntpdate</category><category>net</category><category>ffuf</category><category>ldap</category><category>gitea</category><category>subdomain</category><category>source code</category><category>postgresql</category><category>pgadmin</category><category>cve-2025-2945</category><category>metasploit</category><category>env</category><category>ssh</category><category>process</category><category>docker</category><category>pivot</category><category>ligolo-mp</category><category>nfs</category><category>showmount</category><category>mount</category><category>getent</category><category>debugfs</category><category>ping sweep</category><category>nfs_analyze</category><category>fuse_nfs</category><category>authz</category><category>openssl</category><category>responder</category><category>krb5</category><category>john</category><category>getTGT</category><category>bloodhound</category><category>rusthound-ce</category><category>readGMSAPassword</category><category>adcs</category><category>esc7</category><category>esc6</category><category>esc16</category><category>certipy-ad</category><category>rpcclient</category><category>certify.exe</category><category>certutil</category><category>powershell</category><enclosure url="https://havocx.me//images/pwnedfries.png" length="0" type="image/png"/></item><item><title>SWIMMER CTF OSINT Writeup: Advanced Image Forensics, AI Decoy Detection, and Real-World Attributionon open source intelligence.</title><link>https://havocx.me//ctf/2026-01-16-swimmer-ctf-osint-writeup-advanced-image-forensics-ai-decoy-detection-and-real-world-attributionon-open-source-intelligence/</link><guid isPermaLink="true">https://havocx.me//ctf/2026-01-16-swimmer-ctf-osint-writeup-advanced-image-forensics-ai-decoy-detection-and-real-world-attributionon-open-source-intelligence/</guid><description>This writeup presents a comprehensive solution to the SWIMMER OSINT CTF, covering multiple challenges involving image verification,social media osint, AI-generated decoy detection, metadata analysis, geolocation, and attribution. The investigation demonstrates how modern OSINT challenges intentionally exploit overreliance on EXIF data and visual assumptions by embedding AIGC fingerprints and misleading context. By combining automated metadata extraction, AI provenance detection, reverse image search, and human-centric reasoning, the correct signals were isolated and verified. This case study highlights practical OSINT techniques required to operate effectively in an era of synthetic media and increasingly deceptive open-source artifacts.</description><pubDate>Sat, 17 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/swimmerosintcertficate.png&quot; alt=&quot;SWIMMER CTF OSINT Writeup: Advanced Image Forensics, AI Decoy Detection, and Real-World Attributionon open source intelligence.&quot; /&gt;&lt;/p&gt;&lt;p&gt;This writeup presents a comprehensive solution to the SWIMMER OSINT CTF, covering multiple challenges involving image verification,social media osint, AI-generated decoy detection, metadata analysis, geolocation, and attribution. The investigation demonstrates how modern OSINT challenges intentionally exploit overreliance on EXIF data and visual assumptions by embedding AIGC fingerprints and misleading context. By combining automated metadata extraction, AI provenance detection, reverse image search, and human-centric reasoning, the correct signals were isolated and verified. This case study highlights practical OSINT techniques required to operate effectively in an era of synthetic media and increasingly deceptive open-source artifacts.&lt;/p&gt;</content:encoded><category>ctf</category><category>writeup</category><category>OSINT</category><category>CTF</category><category>SWIMMER CTF</category><category>Open Source Intelligence</category><category>Image Forensics</category><category>AI Generated Images</category><category>AIGC Detection</category><category>Metadata Analysis</category><category>Geolocation</category><category>Digital Forensics</category><category>Reverse Image Search</category><category>Cybersecurity</category><category>Threat Intelligence</category><enclosure url="https://havocx.me//images/swimmerosintcertficate.png" length="0" type="image/png"/></item><item><title>China Osint-Hacktoria-The Hangzhou Pivot: A Multi-Vector OSINT Reconstruction of a T00ls Operative</title><link>https://havocx.me//osint/2026-01-14-china-osint-hacktoria-the-hangzhou-pivot-a-multi-vector-osint-reconstruction-of-a-t00ls-operative/</link><guid isPermaLink="true">https://havocx.me//osint/2026-01-14-china-osint-hacktoria-the-hangzhou-pivot-a-multi-vector-osint-reconstruction-of-a-t00ls-operative/</guid><description>This investigation documents the systematic de-anonymization of a target initially identified through a legacy security blog. By leveraging identifier reuse across the Chinese internet, the research pivots from a QQ-based email to a comprehensive behavioral profile on Baidu Zhidao. The investigation further utilizes specialized infrastructure mirrors to correlate QQ IDs with mobile numbers and Weibo UIDs, ultimately achieving a three-point geographic convergence in Hangzhou, Zhejiang. The report concludes with an analysis of the target&apos;s professional background in IT and the identification of modern blockchain-based access mechanisms within the t00ls community.</description><pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/chinaosintcardimage.png&quot; alt=&quot;China Osint-Hacktoria-The Hangzhou Pivot: A Multi-Vector OSINT Reconstruction of a T00ls Operative&quot; /&gt;&lt;/p&gt;&lt;p&gt;This investigation documents the systematic de-anonymization of a target initially identified through a legacy security blog. By leveraging identifier reuse across the Chinese internet, the research pivots from a QQ-based email to a comprehensive behavioral profile on Baidu Zhidao. The investigation further utilizes specialized infrastructure mirrors to correlate QQ IDs with mobile numbers and Weibo UIDs, ultimately achieving a three-point geographic convergence in Hangzhou, Zhejiang. The report concludes with an analysis of the target&apos;s professional background in IT and the identification of modern blockchain-based access mechanisms within the t00ls community.&lt;/p&gt;</content:encoded><category>osint</category><category>CHINAOSINT</category><category>SocialEngineering</category><category>DigitalForensics</category><category>BaiduZhidao</category><category>InfrastructurePivot</category><category>Hangzhou</category><category>T00ls</category><enclosure url="https://havocx.me//images/chinaosintcardimage.png" length="0" type="image/png"/></item><item><title>Breaking News -bellingcat osint challenge</title><link>https://havocx.me//osint/2026-01-13-breaking-news-bellingcat-osint-challenge/</link><guid isPermaLink="true">https://havocx.me//osint/2026-01-13-breaking-news-bellingcat-osint-challenge/</guid><description>This OSINT challenge tasks participants with identifying why a specific street made international news in 2025. Using visual clues from Google Street View, solvers must geolocate the exact spot and connect it to a real-world event that triggered widespread public attention. The final step requires correlating that location with a contemporaneous news article published by Al Jazeera, specifically extracting the last two words of the article’s title that featured a header image taken from the same vantage point. The challenge tests geolocation accuracy, temporal awareness, and the ability to cross-reference imagery with credible media reporting — core OSINT skills under real-world constraints.</description><pubDate>Wed, 14 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/previre-card-image.png&quot; alt=&quot;Breaking News -bellingcat osint challenge&quot; /&gt;&lt;/p&gt;&lt;p&gt;This OSINT challenge tasks participants with identifying why a specific street made international news in 2025. Using visual clues from Google Street View, solvers must geolocate the exact spot and connect it to a real-world event that triggered widespread public attention. The final step requires correlating that location with a contemporaneous news article published by Al Jazeera, specifically extracting the last two words of the article’s title that featured a header image taken from the same vantage point. The challenge tests geolocation accuracy, temporal awareness, and the ability to cross-reference imagery with credible media reporting — core OSINT skills under real-world constraints.&lt;/p&gt;</content:encoded><category>OpenSourceIntelligence</category><category>osint</category><category>Geolocation</category><category>GoogleStreetView</category><category>NewsAnalysis</category><category>SourceValidation</category><category>DigitalForensics</category><enclosure url="https://havocx.me//images/previre-card-image.png" length="0" type="image/png"/></item><item><title>Climate Question-Bellingcat Open Source Challenge 3</title><link>https://havocx.me//osint/2026-01-13-climate-question-bellingcat-open-source-challenge-3/</link><guid isPermaLink="true">https://havocx.me//osint/2026-01-13-climate-question-bellingcat-open-source-challenge-3/</guid><description>This challenge centers on contextual OSINT within a high-profile international event. Participants are presented with an image from a session at United Nations Climate Change Conference (COP30), held in Belém, and tasked with determining which session it depicts. The investigation requires mapping the visual details of the session—such as panel composition, branding, and staging—to official COP30 schedules and recordings. The final step involves identifying the first audience member to ask a question and extracting their first name, emphasizing careful review of session footage, attention to sequence, and disciplined source verification rather than assumption or guesswork.</description><pubDate>Wed, 14 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/belingcat3.png&quot; alt=&quot;Climate Question-Bellingcat Open Source Challenge 3&quot; /&gt;&lt;/p&gt;&lt;p&gt;This challenge centers on contextual OSINT within a high-profile international event. Participants are presented with an image from a session at United Nations Climate Change Conference (COP30), held in Belém, and tasked with determining which session it depicts. The investigation requires mapping the visual details of the session—such as panel composition, branding, and staging—to official COP30 schedules and recordings. The final step involves identifying the first audience member to ask a question and extracting their first name, emphasizing careful review of session footage, attention to sequence, and disciplined source verification rather than assumption or guesswork.&lt;/p&gt;</content:encoded><category>osint</category><category>OpenSourceIntelligence</category><category>EventVerification</category><category>VisualClues</category><category>COP30</category><category>PublicEvents</category><enclosure url="https://havocx.me//images/belingcat3.png" length="0" type="image/png"/></item><item><title>Lost in Translation-bellingcat osint challenge2</title><link>https://havocx.me//osint/2026-01-14-lost-in-transalation--audio-osint-post/</link><guid isPermaLink="true">https://havocx.me//osint/2026-01-14-lost-in-transalation--audio-osint-post/</guid><description>This challenge focuses on audio-based OSINT, requiring participants to determine the city where an unidentified recording was made. With limited context and language barriers obscuring meaning, solvers must rely on indirect indicators such as accent, background noise, linguistic structure, and regional audio characteristics. By correlating these signals with known geographic and cultural markers, the investigation leads to the city. The puzzle emphasizes a critical OSINT reality — understanding what is being said is often less important than understanding where and why it was recorded.</description><pubDate>Wed, 14 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/infraestructuras-críticas-hackear.webp&quot; alt=&quot;Lost in Translation-bellingcat osint challenge2&quot; /&gt;&lt;/p&gt;&lt;p&gt;This challenge focuses on audio-based OSINT, requiring participants to determine the city where an unidentified recording was made. With limited context and language barriers obscuring meaning, solvers must rely on indirect indicators such as accent, background noise, linguistic structure, and regional audio characteristics. By correlating these signals with known geographic and cultural markers, the investigation leads to the city. The puzzle emphasizes a critical OSINT reality — understanding what is being said is often less important than understanding where and why it was recorded.&lt;/p&gt;</content:encoded><category>OSINT</category><category>OpenSourceIntelligence</category><category>AudioOSINT</category><category>AudioAnalysis</category><category>AccentRecognition</category><category>InvestigativeMethods</category><category>Linguistics</category><category>SignalAnalysis</category><enclosure url="https://havocx.me//images/infraestructuras-críticas-hackear.webp" length="0" type="image/webp"/></item><item><title>The Naughty List: HavocSec&apos;s 2026 Cybersecurity Predictions (A Developer&apos;s Survival Guide)</title><link>https://havocx.me//blog/2025-12-22-the-naughty-list-havocsecs-2026-cybersecurity-predictions-a-developers-survival-guide/</link><guid isPermaLink="true">https://havocx.me//blog/2025-12-22-the-naughty-list-havocsecs-2026-cybersecurity-predictions-a-developers-survival-guide/</guid><description>Quantum Security, Zero Trust Architecture, Developer Security, Code Security, Hacking Trends, HavocSec</description><pubDate>Mon, 22 Dec 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/1000832990.jpg&quot; alt=&quot;The Naughty List: HavocSec&apos;s 2026 Cybersecurity Predictions (A Developer&apos;s Survival Guide)&quot; /&gt;&lt;/p&gt;&lt;p&gt;Quantum Security, Zero Trust Architecture, Developer Security, Code Security, Hacking Trends, HavocSec&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/1000832990.jpg" length="0" type="image/jpeg"/></item><item><title>NahamCon Winter CTF</title><link>https://havocx.me//ctf/2025-12-19-nahamcon-winter-ctf/</link><guid isPermaLink="true">https://havocx.me//ctf/2025-12-19-nahamcon-winter-ctf/</guid><description>NAHAMCON Winter CTF 2025 kicked off on December 17th at 12:00 PM Pacific Time, bringing together the global security community for a fast-paced, high-signal Capture The Flag competition. With a strong focus on real-world offensive and defensive security skills, the event challenged participants across multiple domains while rewarding precision, speed, and depth of understanding. The competition featured a $2,000+ prize pool, including rewards for the top three teams and a bonus for the first team to complete The Mission, backed by industry sponsors such as Flare Academy, Project-Discovery, YesWeHack, Gray Swan, Snyk, and HackingHub.</description><pubDate>Fri, 19 Dec 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/cardimagenahamcon.png&quot; alt=&quot;NahamCon Winter CTF&quot; /&gt;&lt;/p&gt;&lt;p&gt;NAHAMCON Winter CTF 2025 kicked off on December 17th at 12:00 PM Pacific Time, bringing together the global security community for a fast-paced, high-signal Capture The Flag competition. With a strong focus on real-world offensive and defensive security skills, the event challenged participants across multiple domains while rewarding precision, speed, and depth of understanding. The competition featured a $2,000+ prize pool, including rewards for the top three teams and a bonus for the first team to complete The Mission, backed by industry sponsors such as Flare Academy, Project-Discovery, YesWeHack, Gray Swan, Snyk, and HackingHub.&lt;/p&gt;</content:encoded><category>ctf</category><category>writeup</category><category>nahamcon</category><category>walkthrough</category><category>reverse-engineering</category><category>crypto</category><enclosure url="https://havocx.me//images/cardimagenahamcon.png" length="0" type="image/png"/></item><item><title>The Silent Spy: How Malicious Browser Extensions Are Harvesting Your AI Chats and Stealing Credentials.</title><link>https://havocx.me//blog/2025-12-17-the-silent-spy-how-malicious-browser-extensions-are-harvesting-your-ai-chats-and-stealing-credentials/</link><guid isPermaLink="true">https://havocx.me//blog/2025-12-17-the-silent-spy-how-malicious-browser-extensions-are-harvesting-your-ai-chats-and-stealing-credentials/</guid><description>Browser &apos;privacy&apos; extensions have eye on your AI, log all your chats
More than 8 million people have installed extensions that eavesdrop on chatbot interactions</description><pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/1000808112.png&quot; alt=&quot;The Silent Spy: How Malicious Browser Extensions Are Harvesting Your AI Chats and Stealing Credentials.&quot; /&gt;&lt;/p&gt;&lt;p&gt;Browser &apos;privacy&apos; extensions have eye on your AI, log all your chats
More than 8 million people have installed extensions that eavesdrop on chatbot interactions&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/1000808112.png" length="0" type="image/png"/></item><item><title>niteCTF 2025 writeup</title><link>https://havocx.me//ctf/2025-12-15-nitectf-2025-writeup/</link><guid isPermaLink="true">https://havocx.me//ctf/2025-12-15-nitectf-2025-writeup/</guid><description>The following is an osint walkthrough i had an honour to do.</description><pubDate>Mon, 15 Dec 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/nitecard.png&quot; alt=&quot;niteCTF 2025 writeup&quot; /&gt;&lt;/p&gt;&lt;p&gt;The following is an osint walkthrough i had an honour to do.&lt;/p&gt;</content:encoded><category>ctf</category><category>writeup</category><category>niteCTF2025</category><category>walkthrough</category><category>writeup</category><category>osint</category><enclosure url="https://havocx.me//images/nitecard.png" length="0" type="image/png"/></item><item><title>NexHunt CTF-2025</title><link>https://havocx.me//ctf/2025-12-15-nexhunt-ctf-2025/</link><guid isPermaLink="true">https://havocx.me//ctf/2025-12-15-nexhunt-ctf-2025/</guid><description>Blockchain/Web3/SmartContracts Challenges i managed to solve in this in this ctf.</description><pubDate>Mon, 15 Dec 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/blockchainfeatureimage.png&quot; alt=&quot;NexHunt CTF-2025&quot; /&gt;&lt;/p&gt;&lt;p&gt;Blockchain/Web3/SmartContracts Challenges i managed to solve in this in this ctf.&lt;/p&gt;</content:encoded><category>ctf</category><category>writeup</category><category>walkthrough</category><category>2025</category><category>nexhunt</category><category>blockchain</category><category>web3</category><enclosure url="https://havocx.me//images/blockchainfeatureimage.png" length="0" type="image/png"/></item><item><title>Tech LOLs: A Byte of Humor for Your Inner Geek</title><link>https://havocx.me//chitchat/2025-12-09-tech-lols-a-byte-of-humor-for-your-inner-geek/</link><guid isPermaLink="true">https://havocx.me//chitchat/2025-12-09-tech-lols-a-byte-of-humor-for-your-inner-geek/</guid><description>Dive into the lighter side of technology with our curated collection of hilarious tech memes, jokes, and GIFs. From the daily struggles of programmers to the absurdities of cybersecurity, this blog post is your go-to source for a much-needed laugh. Whether you&apos;re a seasoned developer or just a tech enthusiast, you&apos;ll find something to chuckle at in our roundup of the best tech humor on the internet.</description><pubDate>Tue, 09 Dec 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/humor.png&quot; alt=&quot;Tech LOLs: A Byte of Humor for Your Inner Geek&quot; /&gt;&lt;/p&gt;&lt;p&gt;Dive into the lighter side of technology with our curated collection of hilarious tech memes, jokes, and GIFs. From the daily struggles of programmers to the absurdities of cybersecurity, this blog post is your go-to source for a much-needed laugh. Whether you&apos;re a seasoned developer or just a tech enthusiast, you&apos;ll find something to chuckle at in our roundup of the best tech humor on the internet.&lt;/p&gt;</content:encoded><category>chitchat</category><category>tech humor</category><category>programming memes</category><category>coding jokes</category><category>cybersecurity humor</category><category>hacking memes</category><category>developer jokes</category><category>IT humor</category><category>funny tech</category><category>geek humor</category><category>tech memes</category><category>tech jokes</category><category>programming humor</category><enclosure url="https://havocx.me//images/humor.png" length="0" type="image/png"/></item><item><title>P3rf3ctr00t CTF 2025-WRITEUP</title><link>https://havocx.me//ctf/2025-12-08-p3rf3ctr00t-ctf-2025-writeup/</link><guid isPermaLink="true">https://havocx.me//ctf/2025-12-08-p3rf3ctr00t-ctf-2025-writeup/</guid><description>In this writeup I walk you through my journey during P3rf3ctr00t CTF 2025 — a 48-hour capture-the-flag marathon organized by p3rf3ctr00t. I break down each challenge I solved: the approach, the mistakes, the wins, and the lessons learned. Whether you’re a first-time CTFer or a seasoned hacker, this writeup aims to give you insight into the problem-solving mindset, the tools, and the strategies that turned chaos into flags.</description><pubDate>Mon, 08 Dec 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/prootcard.png&quot; alt=&quot;P3rf3ctr00t CTF 2025-WRITEUP&quot; /&gt;&lt;/p&gt;&lt;p&gt;In this writeup I walk you through my journey during P3rf3ctr00t CTF 2025 — a 48-hour capture-the-flag marathon organized by p3rf3ctr00t. I break down each challenge I solved: the approach, the mistakes, the wins, and the lessons learned. Whether you’re a first-time CTFer or a seasoned hacker, this writeup aims to give you insight into the problem-solving mindset, the tools, and the strategies that turned chaos into flags.&lt;/p&gt;</content:encoded><category>ctf</category><category>writeup</category><category>P3rf3ctr00t</category><category>walkthrough</category><category>crypto</category><category>rev</category><category>malware</category><category>web</category><category/><enclosure url="https://havocx.me//images/prootcard.png" length="0" type="image/png"/></item><item><title>GlacierCTF Writeup</title><link>https://havocx.me//ctf/2025-12-06-glacierctf-writeup/</link><guid isPermaLink="true">https://havocx.me//ctf/2025-12-06-glacierctf-writeup/</guid><description>A series of questions i happened to solve in  this ctf ,enjoy</description><pubDate>Sat, 06 Dec 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/glacier.png&quot; alt=&quot;GlacierCTF Writeup&quot; /&gt;&lt;/p&gt;&lt;p&gt;A series of questions i happened to solve in  this ctf ,enjoy&lt;/p&gt;</content:encoded><category>ctf</category><category>writeup</category><category>glacierctf</category><category>writeup</category><category>walkthrough</category><category>crypto</category><enclosure url="https://havocx.me//images/glacier.png" length="0" type="image/png"/></item><item><title>HackTheBox Gavel Walkthrough (Linux – Medium)</title><link>https://havocx.me//pentesting/hackthebox/hackthebox-gavel-walkthrough-linux--medium/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/hackthebox-gavel-walkthrough-linux--medium/</guid><description>This HackTheBox Gavel writeup provides a full walkthrough for the Linux Medium machine from Season 9.
it covers the entire exploitation chain, including enumeration, misconfiguration discovery, service abuse, gaining an initial foothold, and achieving root through privilege escalation.
This guide is designed for learners who want a clear, realistic, attacker-focused approach to solving HTB gavel machine  and improving their penetration testing skills.</description><pubDate>Sun, 30 Nov 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/card.png&quot; alt=&quot;HackTheBox Gavel Walkthrough (Linux – Medium)&quot; /&gt;&lt;/p&gt;&lt;p&gt;This HackTheBox Gavel writeup provides a full walkthrough for the Linux Medium machine from Season 9.
it covers the entire exploitation chain, including enumeration, misconfiguration discovery, service abuse, gaining an initial foothold, and achieving root through privilege escalation.
This guide is designed for learners who want a clear, realistic, attacker-focused approach to solving HTB gavel machine  and improving their penetration testing skills.&lt;/p&gt;</content:encoded><category>pentesting</category><category>htb</category><category>hackthebox</category><enclosure url="https://havocx.me//images/card.png" length="0" type="image/png"/></item><item><title>Eighteen — HTB S9  machine Writeup</title><link>https://havocx.me//pentesting/hackthebox/eighteen--htb-s9-machine-writeup/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/eighteen--htb-s9-machine-writeup/</guid><description>From low MSSQL creds to DA via impersonation, web hash crack, and WinRM.
Abuse Bad Successor (dMSA) on Server 2025 to dump NTDS and take Administrator.</description><pubDate>Sat, 29 Nov 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/info.png&quot; alt=&quot;Eighteen — HTB S9  machine Writeup&quot; /&gt;&lt;/p&gt;&lt;p&gt;From low MSSQL creds to DA via impersonation, web hash crack, and WinRM.
Abuse Bad Successor (dMSA) on Server 2025 to dump NTDS and take Administrator.&lt;/p&gt;</content:encoded><category>htb</category><category>writeups</category><category>activemachines</category><category>hackthebox</category><category>eighteen</category><enclosure url="https://havocx.me//images/info.png" length="0" type="image/png"/></item><item><title>The Hidden Risk in Modern Tech: Why Centralizing Everything in One Provider Is a Security Calamity Waiting to Happen</title><link>https://havocx.me//blog/the-hidden-risk-in-modern-tech-why-centralizing-everything-in-one-provider-is-a-security-calamity-waiting-to-happen/</link><guid isPermaLink="true">https://havocx.me//blog/the-hidden-risk-in-modern-tech-why-centralizing-everything-in-one-provider-is-a-security-calamity-waiting-to-happen/</guid><description>Modern infrastructure looks powerful, but it’s increasingly fragile. When companies centralize everything under a single provider, a single outage can cascade across entire ecosystems — from authentication failures to global service blackouts. Using major AWS, Azure, and Cloudflare outages as evidence, this post breaks down why centralization is a hidden architectural risk and explains how to design systems that remain resilient even when your cloud provider collapses.</description><pubDate>Sat, 22 Nov 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/the-hidden-risk-in-modern-tech-why-centralizing-everything-in-one-provider-is-a-security-calamity-waiting-to-happen/aws.png&quot; alt=&quot;The Hidden Risk in Modern Tech: Why Centralizing Everything in One Provider Is a Security Calamity Waiting to Happen&quot; /&gt;&lt;/p&gt;&lt;p&gt;Modern infrastructure looks powerful, but it’s increasingly fragile. When companies centralize everything under a single provider, a single outage can cascade across entire ecosystems — from authentication failures to global service blackouts. Using major AWS, Azure, and Cloudflare outages as evidence, this post breaks down why centralization is a hidden architectural risk and explains how to design systems that remain resilient even when your cloud provider collapses.&lt;/p&gt;</content:encoded><category>cloud</category><category>security</category><category>decentralization</category><category>outage</category><category>tech</category><enclosure url="https://havocx.me//images/the-hidden-risk-in-modern-tech-why-centralizing-everything-in-one-provider-is-a-security-calamity-waiting-to-happen/aws.png" length="0" type="image/png"/></item><item><title>How I Levelled Up My Pentesting Workflow by Automating the Boring Stuff</title><link>https://havocx.me//blog/how-i-levelled-up-my-pentesting-workflow-by-automating-the-boring-stuff/</link><guid isPermaLink="true">https://havocx.me//blog/how-i-levelled-up-my-pentesting-workflow-by-automating-the-boring-stuff/</guid><description>Most pentesters hit a ceiling without realizing it - too much manual recon, too many repeated steps, and too little time spent actually exploiting. I break down how I automated my workflow, removed friction, and built a system that lets me operate faster, smarter, and with fewer mistakes — in real engagements and CTFs.</description><pubDate>Fri, 21 Nov 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//how-i-levelled-up-my-pentesting-workflow-by-automating-the-boring-stuff/2.webp&quot; alt=&quot;How I Levelled Up My Pentesting Workflow by Automating the Boring Stuff&quot; /&gt;&lt;/p&gt;&lt;p&gt;Most pentesters hit a ceiling without realizing it - too much manual recon, too many repeated steps, and too little time spent actually exploiting. I break down how I automated my workflow, removed friction, and built a system that lets me operate faster, smarter, and with fewer mistakes — in real engagements and CTFs.&lt;/p&gt;</content:encoded><category>pentesting</category><category>automation</category><category>ctf</category><category>recon</category><category>workflow</category><enclosure url="https://havocx.me//how-i-levelled-up-my-pentesting-workflow-by-automating-the-boring-stuff/2.webp" length="0" type="image/webp"/></item><item><title>HTB NanoCorp</title><link>https://havocx.me//pentesting/hackthebox/htb5/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/htb5/</guid><description>A full walkthrough of HTB NanoCorp, covering Windows exploitation, Active Directory abuse, NTLM relay, and privilege escalation techniques.</description><pubDate>Tue, 11 Nov 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/pwned.png&quot; alt=&quot;HTB NanoCorp&quot; /&gt;&lt;/p&gt;&lt;p&gt;A full walkthrough of HTB NanoCorp, covering Windows exploitation, Active Directory abuse, NTLM relay, and privilege escalation techniques.&lt;/p&gt;</content:encoded><category>HackTheBox</category><category>HTB Writeup</category><category>NanoCorp</category><category>Windows Exploitation</category><category>Active Directory</category><category>NTLM Relay</category><category>Privilege Escalation</category><category>CVE Exploitation</category><category>Hard Difficulty</category><category>Enumeration</category><category>Credential Discovery</category><category>Penetration Testing</category><category>Windows Security</category><enclosure url="https://havocx.me//images/pwned.png" length="0" type="image/png"/></item><item><title>HTB CodePartTwo Walkthrough</title><link>https://havocx.me//pentesting/hackthebox/htb4/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/htb4/</guid><description>A full walkthrough and exploitation guide for the HTB CodePartTwo machine, covering enumeration, vulnerability analysis, exploitation, and privilege escalation.</description><pubDate>Wed, 29 Oct 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/code.png&quot; alt=&quot;HTB CodePartTwo Walkthrough&quot; /&gt;&lt;/p&gt;&lt;p&gt;A full walkthrough and exploitation guide for the HTB CodePartTwo machine, covering enumeration, vulnerability analysis, exploitation, and privilege escalation.&lt;/p&gt;</content:encoded><category>pentesting</category><category>htb</category><category>hackthebox</category><enclosure url="https://havocx.me//images/code.png" length="0" type="image/png"/></item><item><title>Guardian HTB</title><link>https://havocx.me//pentesting/hackthebox/htb3/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/htb3/</guid><description>A step-by-step penetration testing walkthrough of the Guardian machine on HackTheBox.</description><pubDate>Tue, 28 Oct 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/guard.png&quot; alt=&quot;Guardian HTB&quot; /&gt;&lt;/p&gt;&lt;p&gt;A step-by-step penetration testing walkthrough of the Guardian machine on HackTheBox.&lt;/p&gt;</content:encoded><category>pentesting</category><category>htb</category><category>hackthebox</category><enclosure url="https://havocx.me//images/guard.png" length="0" type="image/png"/></item><item><title>ProtoVault Breach</title><link>https://havocx.me//pentesting/protovault-breach/</link><guid isPermaLink="true">https://havocx.me//pentesting/protovault-breach/</guid><description>A walkthrough of an Offensive Security challenge analyzing a database leak and S3 exposure, including investigation steps and solutions.</description><pubDate>Thu, 23 Oct 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/op.png&quot; alt=&quot;ProtoVault Breach&quot; /&gt;&lt;/p&gt;&lt;p&gt;A walkthrough of an Offensive Security challenge analyzing a database leak and S3 exposure, including investigation steps and solutions.&lt;/p&gt;</content:encoded><category>pentesting</category><category>offsec</category><category>database</category><category>s3</category><category>security</category><category>challenge</category><enclosure url="https://havocx.me//images/op.png" length="0" type="image/png"/></item><item><title>QnQSec CTF 2025 Writeup</title><link>https://havocx.me//ctf/qnqsec-ctf-2025-writeup/</link><guid isPermaLink="true">https://havocx.me//ctf/qnqsec-ctf-2025-writeup/</guid><description>A comprehensive writeup of the OSINT challenges faced during the QnQSec CTF 2025.</description><pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/cover1.png&quot; alt=&quot;QnQSec CTF 2025 Writeup&quot; /&gt;&lt;/p&gt;&lt;p&gt;A comprehensive writeup of the OSINT challenges faced during the QnQSec CTF 2025.&lt;/p&gt;</content:encoded><category>CTF</category><category>Writeup</category><category>OSINT</category><category>Firmware Analysis</category><enclosure url="https://havocx.me//images/cover1.png" length="0" type="image/png"/></item><item><title>DarkZero HTB</title><link>https://havocx.me//pentesting/hackthebox/htb2/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/htb2/</guid><description>A detailed walkthrough of the HackTheBox DarkZero machine including initial enumeration, database exploitation, and privilege escalation to domain admin.</description><pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/root.png&quot; alt=&quot;DarkZero HTB&quot; /&gt;&lt;/p&gt;&lt;p&gt;A detailed walkthrough of the HackTheBox DarkZero machine including initial enumeration, database exploitation, and privilege escalation to domain admin.&lt;/p&gt;</content:encoded><category>pentesting</category><category>htb</category><category>hackthebox</category><enclosure url="https://havocx.me//images/root.png" length="0" type="image/png"/></item><item><title>K17 CTF Writeup</title><link>https://havocx.me//ctf/writeup12/</link><guid isPermaLink="true">https://havocx.me//ctf/writeup12/</guid><description>A Capture The Flag event by the UNSW Security Society. There are challenges in Web, Pwn, Misc, Crypto, Rev, and an additional Beginner category. The event is beginner-friendly, but with a wide range of challenge difficulties.</description><pubDate>Sun, 21 Sep 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/k17.png&quot; alt=&quot;K17 CTF Writeup&quot; /&gt;&lt;/p&gt;&lt;p&gt;A Capture The Flag event by the UNSW Security Society. There are challenges in Web, Pwn, Misc, Crypto, Rev, and an additional Beginner category. The event is beginner-friendly, but with a wide range of challenge difficulties.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/k17.png" length="0" type="image/png"/></item><item><title>HackTheBox Expressway</title><link>https://havocx.me//pentesting/hackthebox/htb1/</link><guid isPermaLink="true">https://havocx.me//pentesting/hackthebox/htb1/</guid><description>A detailed walkthrough of the HackTheBox Expressway machine including initial enumeration, foothold, and privilege escalation.</description><pubDate>Sun, 21 Sep 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/pwn.png&quot; alt=&quot;HackTheBox Expressway&quot; /&gt;&lt;/p&gt;&lt;p&gt;A detailed walkthrough of the HackTheBox Expressway machine including initial enumeration, foothold, and privilege escalation.&lt;/p&gt;</content:encoded><category>pentesting</category><category>htb</category><category>hackthebox</category><enclosure url="https://havocx.me//images/pwn.png" length="0" type="image/png"/></item><item><title>The Good Side of Open Source: Why It Matters to You</title><link>https://havocx.me//blog/post11/</link><guid isPermaLink="true">https://havocx.me//blog/post11/</guid><description>Open source software is more than just a coding philosophy; it&apos;s a movement that empowers individuals and fosters innovation. Discover how it impacts your life and the tech you use every day.</description><pubDate>Tue, 26 Aug 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/button.png&quot; alt=&quot;The Good Side of Open Source: Why It Matters to You&quot; /&gt;&lt;/p&gt;&lt;p&gt;Open source software is more than just a coding philosophy; it&apos;s a movement that empowers individuals and fosters innovation. Discover how it impacts your life and the tech you use every day.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/button.png" length="0" type="image/png"/></item><item><title>scriptCTF Writeup</title><link>https://havocx.me//ctf/writeup11/</link><guid isPermaLink="true">https://havocx.me//ctf/writeup11/</guid><description>* This game was developed, hosted and released by ScriptSorcerers !!*</description><pubDate>Mon, 18 Aug 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/two.png&quot; alt=&quot;scriptCTF Writeup&quot; /&gt;&lt;/p&gt;&lt;p&gt;* This game was developed, hosted and released by ScriptSorcerers !!*&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/two.png" length="0" type="image/png"/></item><item><title>Level Up Your Learning: How to Master Anything (Even if You&apos;re Starting from Scratch!)</title><link>https://havocx.me//blog/post10/</link><guid isPermaLink="true">https://havocx.me//blog/post10/</guid><description>In a world where knowledge is power, learning how to learn is your ultimate superpower. This guide will take you through the essential steps to become a self-taught expert in any field.</description><pubDate>Fri, 15 Aug 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/dont.webp&quot; alt=&quot;Level Up Your Learning: How to Master Anything (Even if You&apos;re Starting from Scratch!)&quot; /&gt;&lt;/p&gt;&lt;p&gt;In a world where knowledge is power, learning how to learn is your ultimate superpower. This guide will take you through the essential steps to become a self-taught expert in any field.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/dont.webp" length="0" type="image/webp"/></item><item><title>The Dark Side of Open Source: When Community Projects Go Rogue</title><link>https://havocx.me//blog/post9/</link><guid isPermaLink="true">https://havocx.me//blog/post9/</guid><description>Open source software is built by communities and shared freely, but it can also have its dark side. This article explores the risks of malicious code, abandoned projects, and supply chain attacks, while offering tips on how to stay safe in the open-source world.</description><pubDate>Wed, 25 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/open.webp&quot; alt=&quot;The Dark Side of Open Source: When Community Projects Go Rogue&quot; /&gt;&lt;/p&gt;&lt;p&gt;Open source software is built by communities and shared freely, but it can also have its dark side. This article explores the risks of malicious code, abandoned projects, and supply chain attacks, while offering tips on how to stay safe in the open-source world.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/open.webp" length="0" type="image/webp"/></item><item><title>Your Brain on Memes: The Science Behind Why We Love Internet Humor</title><link>https://havocx.me//chitchat/chat2/</link><guid isPermaLink="true">https://havocx.me//chitchat/chat2/</guid><description>Ever found yourself scrolling through your phone, suddenly bursting into laughter at a picture with some text on it? You know, a meme! From grumpy</description><pubDate>Wed, 25 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/drive.jpeg&quot; alt=&quot;Your Brain on Memes: The Science Behind Why We Love Internet Humor&quot; /&gt;&lt;/p&gt;&lt;p&gt;Ever found yourself scrolling through your phone, suddenly bursting into laughter at a picture with some text on it? You know, a meme! From grumpy&lt;/p&gt;</content:encoded><category>chitchat</category><category>memes</category><category>internet humor</category><category>psychology</category><category>laughter</category><category>cognitive science</category><category>social media</category><enclosure url="https://havocx.me//images/drive.jpeg" length="0" type="image/jpeg"/></item><item><title>GPN KITCTF 2025 - CTF Writeup</title><link>https://havocx.me//ctf/writeup10/</link><guid isPermaLink="true">https://havocx.me//ctf/writeup10/</guid><description>* This game was developed, hosted and released by KITCTF !!*</description><pubDate>Sun, 22 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/cover.png&quot; alt=&quot;GPN KITCTF 2025 - CTF Writeup&quot; /&gt;&lt;/p&gt;&lt;p&gt;* This game was developed, hosted and released by KITCTF !!*&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/cover.png" length="0" type="image/png"/></item><item><title>The &apos;Elite&apos; Hacker Wannabes:Social Media Pressure</title><link>https://havocx.me//chitchat/chat1/</link><guid isPermaLink="true">https://havocx.me//chitchat/chat1/</guid><description>A humorous take on the social media pressure faced by aspiring hackers, exploring the phenomenon of self-proclaimed &apos;elite&apos; hackers and the unrealistic expectations they set for beginners in the cybersecurity field.</description><pubDate>Tue, 17 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/hacker.jpg&quot; alt=&quot;The &apos;Elite&apos; Hacker Wannabes:Social Media Pressure&quot; /&gt;&lt;/p&gt;&lt;p&gt;A humorous take on the social media pressure faced by aspiring hackers, exploring the phenomenon of self-proclaimed &apos;elite&apos; hackers and the unrealistic expectations they set for beginners in the cybersecurity field.&lt;/p&gt;</content:encoded><category>chitchat</category><category>social media</category><category>cybersecurity</category><category>humor</category><enclosure url="https://havocx.me//images/hacker.jpg" length="0" type="image/jpeg"/></item><item><title>Security Club of Kimathi CTF</title><link>https://havocx.me//ctf/writeup9/</link><guid isPermaLink="true">https://havocx.me//ctf/writeup9/</guid><description>* cool and juicy!!*</description><pubDate>Mon, 16 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/block.webp&quot; alt=&quot;Security Club of Kimathi CTF&quot; /&gt;&lt;/p&gt;&lt;p&gt;* cool and juicy!!*&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/block.webp" length="0" type="image/webp"/></item><item><title>My thoughts on being an Hacker</title><link>https://havocx.me//blog/post8/</link><guid isPermaLink="true">https://havocx.me//blog/post8/</guid><description>Whats Really Hacking and who Is Really A Hacker.</description><pubDate>Wed, 11 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/info.png&quot; alt=&quot;My thoughts on being an Hacker&quot; /&gt;&lt;/p&gt;&lt;p&gt;Whats Really Hacking and who Is Really A Hacker.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/info.png" length="0" type="image/png"/></item><item><title>CYBERGAME-2025 {MALWARE-ANALYSIS &amp; REVERSE-ENG&apos;}</title><link>https://havocx.me//ctf/writeup5/</link><guid isPermaLink="true">https://havocx.me//ctf/writeup5/</guid><description>* Kenyan version organized by: Ministry of Information,Communications and the Digital Economy*</description><pubDate>Wed, 11 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/cybergame.png&quot; alt=&quot;CYBERGAME-2025 {MALWARE-ANALYSIS &amp; REVERSE-ENG&apos;}&quot; /&gt;&lt;/p&gt;&lt;p&gt;* Kenyan version organized by: Ministry of Information,Communications and the Digital Economy*&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/cybergame.png" length="0" type="image/png"/></item><item><title>CYBERGAME-2025 {PROCESS AND GOVERNANCE}</title><link>https://havocx.me//ctf/writeup7/</link><guid isPermaLink="true">https://havocx.me//ctf/writeup7/</guid><description>* Kenyan version organized by: Ministry of Information,Communications and the Digital Economy*</description><pubDate>Wed, 11 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/cybergame.png&quot; alt=&quot;CYBERGAME-2025 {PROCESS AND GOVERNANCE}&quot; /&gt;&lt;/p&gt;&lt;p&gt;* Kenyan version organized by: Ministry of Information,Communications and the Digital Economy*&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/cybergame.png" length="0" type="image/png"/></item><item><title>CYBERGAME-2025 {CRYPTOGRAPHY-CHALLENGES}</title><link>https://havocx.me//ctf/writeup8/</link><guid isPermaLink="true">https://havocx.me//ctf/writeup8/</guid><description>* Kenyan version organized by: Ministry of Information,Communications and the Digital Economy*</description><pubDate>Wed, 11 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/cybergame.png&quot; alt=&quot;CYBERGAME-2025 {CRYPTOGRAPHY-CHALLENGES}&quot; /&gt;&lt;/p&gt;&lt;p&gt;* Kenyan version organized by: Ministry of Information,Communications and the Digital Economy*&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/cybergame.png" length="0" type="image/png"/></item><item><title>CYBERGAME-2025 {FORENSIC-CHALLENGES}</title><link>https://havocx.me//ctf/writeup3/</link><guid isPermaLink="true">https://havocx.me//ctf/writeup3/</guid><description>* Kenyan version organized by: Ministry of Information,Communications and the Digital Economy*</description><pubDate>Tue, 10 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/cybergame.png&quot; alt=&quot;CYBERGAME-2025 {FORENSIC-CHALLENGES}&quot; /&gt;&lt;/p&gt;&lt;p&gt;* Kenyan version organized by: Ministry of Information,Communications and the Digital Economy*&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/cybergame.png" length="0" type="image/png"/></item><item><title>CYBERGAME-2025 {OSINT CHALLENGES}</title><link>https://havocx.me//ctf/writeup4/</link><guid isPermaLink="true">https://havocx.me//ctf/writeup4/</guid><description>* Kenyan version organized by: Ministry of Information,Communications and the Digital Economy*</description><pubDate>Tue, 10 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/cybergame.png&quot; alt=&quot;CYBERGAME-2025 {OSINT CHALLENGES}&quot; /&gt;&lt;/p&gt;&lt;p&gt;* Kenyan version organized by: Ministry of Information,Communications and the Digital Economy*&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/cybergame.png" length="0" type="image/png"/></item><item><title>CYBERGAME-2025 {WEB-PENTESTING &amp; BINARY-EXPLOITATION}</title><link>https://havocx.me//ctf/writeup6/</link><guid isPermaLink="true">https://havocx.me//ctf/writeup6/</guid><description>* Kenyan version organized by: Ministry of Information,Communications and the Digital Economy*</description><pubDate>Tue, 10 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/cybergame.png&quot; alt=&quot;CYBERGAME-2025 {WEB-PENTESTING &amp; BINARY-EXPLOITATION}&quot; /&gt;&lt;/p&gt;&lt;p&gt;* Kenyan version organized by: Ministry of Information,Communications and the Digital Economy*&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/cybergame.png" length="0" type="image/png"/></item><item><title>🛠️ Top 10 Real-World Exploits That Started as CTF Challenges</title><link>https://havocx.me//blog/post7/</link><guid isPermaLink="true">https://havocx.me//blog/post7/</guid><description>A breakdown of real cybersecurity incidents that originated from techniques first seen in Capture The Flag competitions.</description><pubDate>Mon, 09 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/info.png&quot; alt=&quot;🛠️ Top 10 Real-World Exploits That Started as CTF Challenges&quot; /&gt;&lt;/p&gt;&lt;p&gt;A breakdown of real cybersecurity incidents that originated from techniques first seen in Capture The Flag competitions.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/info.png" length="0" type="image/png"/></item><item><title>Hacking: Beyond the Hollywood Stereotype</title><link>https://havocx.me//blog/post6/</link><guid isPermaLink="true">https://havocx.me//blog/post6/</guid><description>Unlock your superpower.hacking is a superpower when you master it.</description><pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/hacking.webp&quot; alt=&quot;Hacking: Beyond the Hollywood Stereotype&quot; /&gt;&lt;/p&gt;&lt;p&gt;Unlock your superpower.hacking is a superpower when you master it.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/hacking.webp" length="0" type="image/webp"/></item><item><title>NAHAMCON-CTF - 2025</title><link>https://havocx.me//ctf/writeup2/</link><guid isPermaLink="true">https://havocx.me//ctf/writeup2/</guid><description>*The 2025 challenges were really cool*</description><pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/nahamcon-ctf.png&quot; alt=&quot;NAHAMCON-CTF - 2025&quot; /&gt;&lt;/p&gt;&lt;p&gt;*The 2025 challenges were really cool*&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/nahamcon-ctf.png" length="0" type="image/png"/></item><item><title>Proxying Like a Pro</title><link>https://havocx.me//blog/post5/</link><guid isPermaLink="true">https://havocx.me//blog/post5/</guid><description>*Proxies are indispensable tools for managing, monitoring, and securing network traffic while maintaining anonymity or bypassing restrictions. Whether you&apos;re a developer debugging applications, a penetration tester evading detection, or a forensics investigator tracing malicious activity, mastering proxies is a game-changer. This blog post dives deep into proxying, covering proxy fundamentals, practical setups with tools like Squid, Charles, Nginx, and ProxyChains, and advanced techniques for pivoting and evading detection. Let&apos;s proxy like a pro!*.</description><pubDate>Fri, 30 May 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/proxy2.jpeg caption:proxy&quot; alt=&quot;Proxying Like a Pro&quot; /&gt;&lt;/p&gt;&lt;p&gt;*Proxies are indispensable tools for managing, monitoring, and securing network traffic while maintaining anonymity or bypassing restrictions. Whether you&apos;re a developer debugging applications, a penetration tester evading detection, or a forensics investigator tracing malicious activity, mastering proxies is a game-changer. This blog post dives deep into proxying, covering proxy fundamentals, practical setups with tools like Squid, Charles, Nginx, and ProxyChains, and advanced techniques for pivoting and evading detection. Let&apos;s proxy like a pro!*.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/proxy2.jpeg caption:proxy" length="0" type="image/*"/></item><item><title>Unlocking  The Kernel superpowers</title><link>https://havocx.me//blog/post4/</link><guid isPermaLink="true">https://havocx.me//blog/post4/</guid><description>*The Linux kernel, the heart of countless operating systems and devices*.</description><pubDate>Thu, 15 May 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/kernel.jpg caption:kernel&quot; alt=&quot;Unlocking  The Kernel superpowers&quot; /&gt;&lt;/p&gt;&lt;p&gt;*The Linux kernel, the heart of countless operating systems and devices*.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/kernel.jpg caption:kernel" length="0" type="image/*"/></item><item><title>BREAK THE SYNTAX CTF - 2025</title><link>https://havocx.me//ctf/writeup1/</link><guid isPermaLink="true">https://havocx.me//ctf/writeup1/</guid><description>*Hosted by KN White Hats, Scientific Club of Students of Wrocław University of Science and Technology*</description><pubDate>Mon, 12 May 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/ctf.png&quot; alt=&quot;BREAK THE SYNTAX CTF - 2025&quot; /&gt;&lt;/p&gt;&lt;p&gt;*Hosted by KN White Hats, Scientific Club of Students of Wrocław University of Science and Technology*&lt;/p&gt;</content:encoded><category>ctf</category><category>writeup</category><category>break-the-syntax</category><category>reverse-engineering</category><category>crypto</category><enclosure url="https://havocx.me//images/ctf.png" length="0" type="image/png"/></item><item><title>Building Your Own Ethical Hacking Lab Using Linux: A Complete Guide</title><link>https://havocx.me//blog/post3/</link><guid isPermaLink="true">https://havocx.me//blog/post3/</guid><description>This guide walks you through setting up a complete ethical hacking lab using Linux. Learn how to install the right tools, deploy vulnerable machines, configure secure virtual networks, and build a safe space to develop practical cybersecurity skills—perfect for OSCP prep, penetration testing practice, or hands-on learning.</description><pubDate>Sun, 11 May 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/images.jpeg&quot; alt=&quot;Building Your Own Ethical Hacking Lab Using Linux: A Complete Guide&quot; /&gt;&lt;/p&gt;&lt;p&gt;This guide walks you through setting up a complete ethical hacking lab using Linux. Learn how to install the right tools, deploy vulnerable machines, configure secure virtual networks, and build a safe space to develop practical cybersecurity skills—perfect for OSCP prep, penetration testing practice, or hands-on learning.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/images.jpeg" length="0" type="image/jpeg"/></item><item><title>Cracking the Code: The Ultimate CTF Companion</title><link>https://havocx.me//blog/post2/</link><guid isPermaLink="true">https://havocx.me//blog/post2/</guid><description>Dive into the world of Capture The Flag competitions—from solving basic cryptography and web challenges to mastering reverse engineering and forensics. Follow hands-on examples, terminal walkthroughs, and expert tips to become a competitive CTF player.</description><pubDate>Fri, 09 May 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/info.png&quot; alt=&quot;Cracking the Code: The Ultimate CTF Companion&quot; /&gt;&lt;/p&gt;&lt;p&gt;Dive into the world of Capture The Flag competitions—from solving basic cryptography and web challenges to mastering reverse engineering and forensics. Follow hands-on examples, terminal walkthroughs, and expert tips to become a competitive CTF player.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/info.png" length="0" type="image/png"/></item><item><title>Mastering Bash Scripting: From Zero to Automation Hero</title><link>https://havocx.me//blog/post1/</link><guid isPermaLink="true">https://havocx.me//blog/post1/</guid><description>Learn Bash scripting from fundamentals to advanced automation with real-world examples, terminal outputs, and pro tips for security and efficiency.</description><pubDate>Thu, 08 May 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;img src=&quot;https://havocx.me//images/linux.jpeg&quot; alt=&quot;Mastering Bash Scripting: From Zero to Automation Hero&quot; /&gt;&lt;/p&gt;&lt;p&gt;Learn Bash scripting from fundamentals to advanced automation with real-world examples, terminal outputs, and pro tips for security and efficiency.&lt;/p&gt;</content:encoded><enclosure url="https://havocx.me//images/linux.jpeg" length="0" type="image/jpeg"/></item></channel></rss>