Daniel Dias’ Post

View profile for Daniel Dias, graphic

CISSP | CCSP | CCSK | Kubestronaut | 2xAzure | Lead Kubernetes Security Architect at RBC

🚩 New CTF Write-Up Completed! 🚩 https://lnkd.in/gpSWhUfE Just wrapped up an exciting Capture The Flag (CTF) exercise where I got to sharpen my skills in enumeration, exploitation, and privilege escalation. 🎯 Key highlights: • Modified an exploit to create a backdoor user after the original payload failed. • Used Burp Suite to intercept and manipulate file upload requests to bypass front-end validation. • Successfully gained root access by leveraging a misconfigured SUID binary. These exercises are always a great way to practice real-world techniques and stay sharp in penetration testing. 💻🔍 #CyberSecurity #CTF #PenetrationTesting #LearningByDoing

PG Practice — QuakerJack

PG Practice — QuakerJack

medium.com

Keep it going Daniel, you are becoming the most skillful hacker on the team!

Like
Reply

To view or add a comment, sign in

Explore topics