~/isko3k — neofetch
[OK] Initializing system...
[OK] Loading modules...
[OK] Establishing connection...
$ neofetch
  _     _        ____  _
 (_)___| | _____|___ \| | __
 | / __| |/ / _ \ __) | |/ /
 | \__ \   < (_) |__ <|   <
 |_|___/_|\_\___/____/|_|\_\
>_
USER: isko3k@enterprise-it
─────────────────────────────
EXPERIENCE: 5+ Years (IT Specialist)
RANK: Top 2% // TryHackMe
NODES: 120+ Managed Devices
UPTIME: 0 Critical Downtime Incidents
SHELL: Terminal / Bash / PowerShell
─────────────────────────────
STACK: Penetration Testing, Essential 8 / GRC, Linux Administration, Network Infrastructure, IAM & Zero Trust, Microsoft 365 Security, MDM (JumpCloud/Intune), VMware Virtualization, Python & Bash Scripting, AI Agent Development, Vulnerability Management, Active Directory, System Hardening, SaaS Operations, Cloud Computing
Type /help for available commands
$

>_CTF Writeups

TryHackMe challenge walkthroughs & security research

View all

Ignite

Exploit a vulnerable FUEL CMS installation through a critical RCE vulnerability (CVE-2018-16763), then escalate privileges via password reuse. A classic lesson in default configs and unpatched software.

RCECMS ExploitationCVEPassword Reuse

The Objective

Exploit an unpatched FUEL CMS to gain initial access, harvest credentials from configuration files, and escalate to root through password reuse.

The Exploit Path

Nmap scan → FUEL CMS 1.4 identification → CVE-2018-16763 RCE via eval() → Web shell deployment → Credential harvesting from database.php → Python PTY for su command → Root access.

2026-02-0510 min read
Read writeup

Pickle Rick

A Rick and Morty themed TryHackMe CTF challenge. Exploit a web server to find three ingredients to help Rick make his potion and turn back from a pickle.

Web ExploitationCommand InjectionLinuxSudo

The Objective

Gain access to a Linux web server and locate three secret ingredients hidden across the system. The challenge tests web enumeration, command injection, and Linux navigation skills.

The Exploit Path

Nmap reconnaissance → Web enumeration with Gobuster → Source code analysis for credentials → Command injection via web panel → Linux file system exploration → Sudo privilege abuse for root access.

2024-03-158 min read
Read writeup

Bounty Hunter

Enumerate a vulnerable web application and exploit XXE to read sensitive files, then escalate privileges through a Python script vulnerability.

XXE InjectionLFIPythonPrivesc

The Objective

Enumerate a vulnerable web application and exploit XXE to read sensitive files. Gain initial foothold and escalate to root.

The Exploit Path

Web enumeration → XXE Injection → Local File Inclusion (LFI) → PHP filter wrapper → Credential extraction → Python script vulnerability exploit for Privilege Escalation.

2024-02-2010 min read
Read writeup

Agent Sudo

Discover a hidden FTP server and crack passwords to gain initial access. Use steganography and hash cracking to escalate privileges.

FTPSteganographyHash CrackingCVE

The Objective

Discover a hidden FTP server and crack passwords to gain initial access. Extract hidden data and escalate to root.

The Exploit Path

Nmap scanning → User-Agent manipulation → FTP Brute force with Hydra → Steganography analysis with binwalk/steghide → Hash cracking with John → CVE-2019-14287 sudo privilege exploitation.

2024-02-1012 min read
Read writeup

Skynet

A Terminator-themed room featuring Samba enumeration, CuppaCMS exploitation via Remote File Inclusion, and cron job privilege escalation.

SambaRFICMS ExploitationCron Jobs

The Objective

Infiltrate a Skynet-themed network by exploiting misconfigured SMB shares, compromising a vulnerable CMS, and leveraging a dangerous cron job for root access.

The Exploit Path

SMB null session enumeration → Password list extraction → SquirrelMail brute force → Hidden directory discovery → CuppaCMS RFI exploitation → Tar wildcard injection via cron.

2024-01-2515 min read
Read writeup

Brute It

Learn brute-force attack techniques against web login forms and SSH, crack password hashes, and escalate privileges via sudo misconfiguration.

Brute ForceHash CrackingSSHSudo

The Objective

Master brute-force techniques for web forms and SSH. Crack hashes and exploit sudo to gain root access.

The Exploit Path

Directory enumeration → Source code analysis → Hydra web form brute force → SSH key extraction → John the Ripper passphrase cracking → Sudo cat privilege escalation → Shadow file extraction.

2024-01-157 min read
Read writeup

RootMe

A beginner-friendly room focusing on web exploitation through file upload vulnerabilities and Linux privilege escalation via SUID binaries.

File UploadPHPSUIDReverse Shell

The Objective

Exploit a file upload vulnerability to gain a shell, then escalate privileges using misconfigured SUID binaries.

The Exploit Path

Nmap scan → Gobuster directory enumeration → File upload filter bypass (.phtml extension) → PHP reverse shell upload → SUID binary enumeration → Python SUID exploitation for root.

2024-01-056 min read
Read writeup

>_Technical Solutions

Real-world automation and infrastructure projects

CAD Build & Update Automation

Transformed a manual, time-consuming CAD update process into a seamless, automated deployment system using Inno Setup, PowerShell, and JumpCloud MDM across 120+ enterprise devices.

PowerShellAutomationJumpCloudMDMInno Setup

The Challenge

Client CAD updates evolved from simple executables to scattered files requiring manual placement across 10+ system folders with .cfg variable changes. This consumed excessive IT hours and caused significant engineer downtime.

The Solution

Created custom executables with Inno Setup Compiler, deployed via JumpCloud MDM push commands with PowerShell automation. Scheduled off-hours rollouts eliminated 100% of engineer downtime while reducing IT overhead by 90%.

20248 min read
Read more

Implementing the Essential 8: A Practical Guide for Small Teams

A pragmatic vCISO roadmap for reaching Essential 8 Maturity Level 1. Designed for scrappy startups.

Essential 8GRCCybersecurity FrameworkHardening

The Challenge

Small teams are prime targets for supply chain attacks but lack the budget and headcount for enterprise security programs, leaving them exposed to commodity threats.

The Solution

A four-phase Essential 8 implementation roadmap — identity controls, automated patching, application hardening, and resilient backups — achieving Maturity Level 1 in four weeks.

2026-02-0912 min read
Read more

Credential Harvesting via Man-in-the-Middle: A Bettercap Methodology

A practical guide to executing and analyzing ARP spoofing and DNS poisoning attacks using Bettercap in a controlled lab environment.

BettercapMiTMARP SpoofingDNS PoisoningCredential HarvestingNetwork Security

The Challenge

Legacy systems and misconfigured web applications still communicate over unencrypted HTTP, leaving credentials and sensitive data exposed to any attacker positioned on the same network segment.

The Solution

A structured Bettercap methodology — ARP spoofing, DNS poisoning, and packet sniffing — demonstrating full credential interception against a vulnerable target in a controlled lab environment.

2026-02-1010 min read
Read more