This is a security-focused blog which will primarily cover walk-through exercises of ‘Capture the Flag’ vulnerable virtual machines. This is an educational blog – these posts will reference various techniques used to exploit different websites and services, for the purpose of learning and improving security. The skills and techniques covered on this blog should not be used for malicious purposes.
Occasionally, I might post something security related, and publish my own CTF exercise for people to do.
That’s about it, really…