<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Posts on Nitel&#39;s Red Logs</title>
    <link>/posts/</link>
    <description>Recent content in Posts on Nitel&#39;s Red Logs</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <lastBuildDate>Mon, 23 Mar 2026 23:15:00 +0000</lastBuildDate><atom:link href="/posts/index.xml" rel="self" type="application/rss+xml" /><item>
      <title>Job — VulnLab Writeup</title>
      <link>/posts/job/</link>
      <pubDate>Mon, 23 Mar 2026 23:15:00 +0000</pubDate>
      
      <guid>/posts/job/</guid>
      <description>Job is a medium-difficulty Windows machine on VulnLab. The attack chain involves crafting a malicious LibreOffice macro sent via SMTP to gain an initial foothold, then escalating to SYSTEM by abusing SeImpersonatePrivilege with GodPotato.</description>
    </item>
    
    <item>
      <title>Cicada — HackTheBox Writeup</title>
      <link>/posts/cicada/</link>
      <pubDate>Mon, 12 Jan 2026 12:33:00 +0000</pubDate>
      
      <guid>/posts/cicada/</guid>
      <description>An easy-rated HTB Active Directory machine. The attack chain involves SMB guest enumeration, RID brute-forcing, password spraying, LDAP dumping, and finally abusing SeBackupPrivilege to extract the Administrator hash.</description>
    </item>
    
    <item>
      <title>Media - VulnLab Writeup</title>
      <link>/posts/media/</link>
      <pubDate>Sun, 11 Jan 2026 12:33:00 +0000</pubDate>
      
      <guid>/posts/media/</guid>
      <description>Exploiting a .wax file upload to steal NTLMv2 credentials, then escalating privileges via SeImpersonate using GodPotato on a Windows target.</description>
    </item>
    
    <item>
      <title>UpDown - HackTheBox Writeup</title>
      <link>/posts/updown/</link>
      <pubDate>Fri, 09 Jan 2026 23:42:00 +0000</pubDate>
      
      <guid>/posts/updown/</guid>
      <description>&lt;strong&gt;UpDown&lt;/strong&gt; is a medium Linux box where you chain an exposed &lt;code&gt;.git&lt;/code&gt; repo, a custom header bypass, and a Phar wrapper LFI + file upload to get a shell. Root involves Python 2 &lt;code&gt;input()&lt;/code&gt; injection on a SUID binary, then &lt;code&gt;easy_install&lt;/code&gt; sudo abuse via GTFOBins.</description>
    </item>
    
    <item>
      <title>Busqueda — HackTheBox Writeup</title>
      <link>/posts/busqueda/</link>
      <pubDate>Thu, 08 Jan 2026 11:57:00 +0000</pubDate>
      
      <guid>/posts/busqueda/</guid>
      <description>A walkthrough of HackTheBox Searcher — exploiting CVE-2023-43364 (Searchor 2.4.0 RCE) for initial access, then leveraging a path injection vulnerability in a privileged Python script to escalate to root.</description>
    </item>
    
    <item>
      <title>Introduction</title>
      <link>/posts/introduction/</link>
      <pubDate>Mon, 08 Jun 2020 08:06:25 +0600</pubDate>
      
      <guid>/posts/introduction/</guid>
      <description>&lt;h1 id=&#34;hi-im-nitel-&#34;&gt;Hi, I&amp;rsquo;m Nitel 👋&lt;/h1&gt;
&lt;p&gt;Application Security &amp;amp; Penetration Testing Specialist based in Seoul, South Korea.&lt;/p&gt;
&lt;p&gt;I write about &lt;strong&gt;offensive security&lt;/strong&gt;, &lt;strong&gt;penetration testing&lt;/strong&gt;, and the intersection of
&lt;strong&gt;secure development&lt;/strong&gt; — from breaking things in labs to building them the right way in production.&lt;/p&gt;
&lt;h2 id=&#34;what-i-do&#34;&gt;What I Do&lt;/h2&gt;
&lt;p&gt;I&amp;rsquo;m an offensive security professional with a background in full-stack development
(React.js / Node.js). I hold the &lt;strong&gt;HTB Certified Penetration Testing Specialist (CPTS)&lt;/strong&gt;
and &lt;strong&gt;PJPT&lt;/strong&gt; certifications, and I&amp;rsquo;m currently pursuing &lt;strong&gt;OSCP&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    
    
  </channel>
</rss>
