0xdf (@0xdf_) 's Twitter Profile
0xdf

@0xdf_

Training Architect @ HackTheBox
"Potentially a legit security researcher"
he/him

youtube.com/c/0xdf0xdf
0xdf.bsky.social
0xdf on discord

ID: 2980607794

linkhttps://0xdf.gitlab.io calendar_today16-01-2015 01:57:29

2,2K Tweet

23,23K Followers

448 Following

0xdf (@0xdf_) 's Twitter Profile Photo

BigBang from Hack The Box starts off with a very tricky vuln chaining a file read in a WordPress plugin to a buffer overflow in Glibc to get RCE. Then there's Grafana and an Android APK. 0xdf.gitlab.io/2025/05/03/htb…

0xdf (@0xdf_) 's Twitter Profile Photo

Following up on the Python UV video, made a cheat sheet to quickly show the commands for reference. You really need to be using uv for Python stuff. 0xdf.gitlab.io/cheatsheets/uv

0xdf (@0xdf_) 's Twitter Profile Photo

Took a shot at updating the tags page on my site, and I'm curious to know what y'all think. Old page is still linked to in the nav bar. New tags are here: 0xdf.gitlab.io/newtags

0xdf (@0xdf_) 's Twitter Profile Photo

Underpass from Hack The Box has SNMP enumeration, daloRADIUS exploitation, and mobile shell (or mosh) abuse. 0xdf.gitlab.io/2025/05/10/htb…

0xdf (@0xdf_) 's Twitter Profile Photo

In Heal from Hack The Box, I'll find a file read to get a rails config / database. I'll get into a LineSurvey instance and make a malicious plugin to get RCE. I'll abuse an insecure Consul instance to root. Beyond Root, an SSRF that didn't work. 0xdf.gitlab.io/2025/05/17/htb…

0xdf (@0xdf_) 's Twitter Profile Photo

Email from 0xSirius and Artu about a neat find on the Heal box from Hack The Box. They used /proc file descriptors to read the database directly from the file read / directory traversal in the website, rather than pull the SQLite db. Let's explore. youtube.com/watch?v=BZnqip…

0xdf (@0xdf_) 's Twitter Profile Photo

Quick video showing how I broke my own proxychains, and how I (with some brainstorming help from IppSec) figured out what was happening and got it fixed. youtube.com/watch?v=XKyTOG…

0xdf (@0xdf_) 's Twitter Profile Photo

Checker from Hack The Box has some really complex exploitation steps. There's SQLI in Teampass, SSRF to file read in BookStack using a blind PHP filter oracle, and shared memory abuse. 0xdf.gitlab.io/2025/05/31/htb…

Dave Kennedy (@hackingdave) 's Twitter Profile Photo

My advice to kids has changed recently and it's not to get a cybersecurity degree. Get a computer science one, with a specialization in AI or an AI solely degree. I feel like right now, the cybersecurity market is pretty rough on hiring folks in - and that's only going to get

0xdf (@0xdf_) 's Twitter Profile Photo

Just released five videos showing four retired very easy coding challenges from Hack The Box, as well as a 5th video showing how to write your own script to submit skipping the web IDE. Hopefully more beginner oriented. youtube.com/watch?v=OC5J9y…

0xdf (@0xdf_) 's Twitter Profile Photo

Another batch of retired coding challenges are out on HackTheBox, this time from the Biz CTF in May. In Threat Index, I'll loop over a series of keyword/weights, adding to the total score based on the number of instances of the keyword in the input. youtube.com/watch?v=k3DysA…

0xdf (@0xdf_) 's Twitter Profile Photo

Backfire from Hack The Box is all about exploiting C2s. The most fun was chaining an SSRF with a command injection to get RCE, writing my own code to open a websocket via the SSRF. I'll exploit both Havoc and HardHatC2. 0xdf.gitlab.io/2025/06/07/htb…

0xdf (@0xdf_) 's Twitter Profile Photo

Triple Knock is another coding challenge from the Hack The Box Biz CTF in May. This is all about parsing data into a way that's usable. I'll use a simple class to handle the parsing and make the data necessary available. Still beginner friendly. youtube.com/watch?v=3iRXRU…

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Today’s a good day to recommend this exceptional book by Kim Zetter: Countdown to Zero Day. Easily in my top 2 cybersecurity books, right after The Cuckoo’s Egg by Clifford Stoll. There’s even an audiobook version for your next commute or evening walk. Amazon 📘

Today’s a good day to recommend this exceptional book by <a href="/KimZetter/">Kim Zetter</a>: Countdown to Zero Day. Easily in my top 2 cybersecurity books, right after The Cuckoo’s Egg by Clifford Stoll.

There’s even an audiobook version for your next commute or evening walk.

Amazon
📘
0xdf (@0xdf_) 's Twitter Profile Photo

Infiltrator from Hack The Box has a ton. There's a lot of exploitation of Output Messenger. There's AD, ADCS, password spray. I learned some interesting bits about changing user's passwords as well. 0xdf.gitlab.io/2025/06/14/htb…

0xdf (@0xdf_) 's Twitter Profile Photo

If you are doing any kind of ADCS enumeration / exploitation, I cannot understate how good and useful the Certipy wiki it. Huge shoutout to Oliver Lyak and the other contributors for this resource. github.com/ly4k/Certipy/w…

0xdf (@0xdf_) 's Twitter Profile Photo

Down is the first machine from Vulnlab to deploy on Hack The Box. It's got a simple SSRF, with a twist to get file read, then breaking into pswm. 0xdf.gitlab.io/2025/06/17/htb…