Practical Cybersecurity, Windows Internals, and Reverse Engineering

Deep-dive posts, investigations, and walkthroughs focused on defenders, learners, and tinkerers. No fluff—just practical knowledge and repeatable steps.

Windows Registry & Services Network & Protocol Basics Web Security & DOM XSS Reverse Engineering

Browse All Articles →

Featured

Reverse engineering article cover

Reverse-Engineering 2

Process analysis tooling, network isolation for safe dynamic analysis, packers and unpacking strategies.

Networking 101 article cover

Networking 101

Topologies, IP addressing, DNS, TCP/UDP, NAT, and troubleshooting fundamentals.

Windows Terminology article cover

Windows Terminology 101

Sessions, processes, and services—mapped to how Windows actually runs.

Latest Articles

SOC 101 cover

SOC — 101

Introduction to the field and identifying suspicious events, tooling, and checks.

Windows Registry cover

The Registry

A practical tour of Windows Registry concepts and hives.

Cyberattacks cover

Cyberattacks — #1

Notes on credential access, weaponizing PowerShell, and local privilege escalation.

DOM XSS cover

DOM XSS

Understanding client-side sinks and defenses for DOM-based XSS.

iptables cover

iptables

Linux firewall foundations with examples and common rules.

Reverse Engineering cover

Reverse Engineering

From PE format and strings to sandboxing and indicators.

IDRAC and ESXi setup cover

iDRAC + ESXi Setup

Bare-metal iDRAC controller and VMware ESXi hypervisor installation.

Windows Terminology cover

Windows Terminology 101

Sessions, processes, and services explained with real OS behavior.

Networking basics cover

Networking 101

LAN vs WAN, addressing, DNS, TCP/UDP, NAT, and more.