Welcome All!

My name is Adam and I'd like to welcome you to my research! This tiny speck in cyberspace explores the relationship between cybersecurity, networking, gaming, and the architecture they are built on. Here you will find cloud-based network and security simulations, vulnerability write-ups, documented results, and any rabbit holes I fall into along the way.

What to Expect

Everything shared here is of personal interest to me. I have a passion for education and most, if not all, of what is shared will be written to help teach those who come across it. We will explore and build systems to see how they're connected, how data moves through them, and we'll document vulnerabilities, solutions, and ideas along the way.

Recent posts

Katana Walkthrough

A step-by-step walkthrough of the VulnHub box “Katana” that exploits a web server via a reverse shell upload

Sar Walkthrough

A step-by-step walkthrough of the VulnHub box “Sar” that exploits sar2HTML via Remote Code Execution (RCE)