Skip to content
  • Home
  • About
  • CTF
  • Wireless
  • Web
  • Recon
Sam's Blog A place where I share my knowledge and experience. I hope my posts add value to your life!
Sam's Blog A place where I share my knowledge and experience. I hope my posts add value to your life!
  • Home
  • About
  • CTF
  • Wireless
  • Web
  • Recon
Desktop monitor with background image of a man looking through binoculars with the Facebook logo reflected in them.
Wireless

Evil Twin Part 2: spying on victims with a MITM attack

We’re back with another Evil Twin...
Sam HilliardAug 20, 2023Sep 4, 2023
CTF

Hack The Box: SAU Writeup

It’s time I get back into...
Sam HilliardAug 7, 2023Aug 7, 2023
Wireless

Building Your Own Evil Twin Access Point from Scratch

Hello again! It’s been a while...
Sam HilliardJul 31, 2023Sep 4, 2023
CTF

Remote code execution via polyglot web shell upload – Portswigger Web Security Academy Lab Walkthrough

In this lab, we will bypass...
Sam HilliardJul 5, 2023Sep 4, 2023
Wireless

How to crack your WiFi network’s password with aircrack-ng

Hello again! If you read my...
Sam HilliardJul 2, 2023Sep 4, 2023
Web

Make access control bug discovery fast and easy with Autorize

We’re back from our slight detour...
Sam HilliardJun 28, 2023Sep 4, 2023
Wireless

How to visualize the networks around you

Hello! In this post we’re going...
Sam HilliardJun 22, 2023Sep 4, 2023
Web

Harnessing the power of wfuzz for web hacking

In today’s post, I’ll introduce you...
Sam HilliardJun 11, 2023Aug 6, 2023
Purple dropper feeds samples into array of test tubes.
Recon

Unveiling my Methodology for Exciting Bug Discoveries and Optimal Results

When I first started getting into...
Sam HilliardMay 22, 2023Aug 6, 2023
Web

How To Reverse Engineer API’s To Boost Your Bug Bounty Workflow

Recently, I’ve been working on APIsec...
Sam HilliardApr 24, 2023Aug 6, 2023
12345
  • Home
  • About
  • CTF
  • Wireless
  • Web
  • Recon