2024  5

July  1

How to Use NVRAM When Emulating an Embedded Device

2024-07-05 · 18 min · Ally Petitt

May  2

How I became a hacker before I finished high school [Repost]

2024-05-07 · 10 min · Ally Petitt

Goodbye World - Migrating Away From Medium | Graduation & Next Steps

2024-05-03 · 5 min · Ally Petitt

March  1

How I Found 3 CVEs in 2 Days

2024-03-21 · 7 min · Ally Petitt

January  1

How to Find more Vulnerabilities — Source Code Auditing Explained

2024-01-01 · 6 min · Ally Petitt

2023  15

December  1

Stealthy Exploit Opens Door for Pre-Compilation Code Execution

2023-12-02 · 6 min · Ally Petitt

September  1

How I Found an Authentication Bypass Vulnerability — CVE-2023–43154

2023-09-29 · 8 min · Ally Petitt

August  2

How to safely convert to LVM without losing your data

2023-08-19 · 4 min · Ally Petitt

Beyond the Screen: The Hidden World of Firmware Security

2023-08-05 · 12 min · Ally Petitt

July  1

Reverse Engineering — Analyzing Headers

2023-07-13 · 11 min · Ally Petitt

June  1

5 Ways I Bypassed Your Web Application Firewall (WAF)

2023-06-01 · 7 min · Ally Petitt

May  3

5 Ways I Found Your Deleted Files

2023-05-13 · 9 min · Ally Petitt

How to Encrypt a Drive in Linux

2023-05-05 · 5 min · Ally Petitt

Snort IPS Quickstart

2023-05-02 · 5 min · Ally Petitt

April  4

Digging into the Linux Secure Boot Process

2023-04-29 · 9 min · Ally Petitt

How to Prevent Data Leaks Before they Happen

2023-04-23 · 3 min · Ally Petitt

Restoring Files in /usr/include

2023-04-13 · 2 min · Ally Petitt

How to Create and Deploy Your Own Cloud Server with NextCloud

2023-04-09 · 5 min · Ally Petitt

March  2

Practical Demonstration: DNS Spoofing + Home Lab

2023-03-28 · 5 min · Ally Petitt

How I got my OSCP at 16 years old

2023-03-19 · 20 min · Ally Petitt

2022  9

December  1

Windows Remoting: Difference between psexec, wmiexec, atexec, *exec

2022-12-09 · 4 min · Ally Petitt

November  2

VPN Troubleshooting: How to fix “Inactivity Timeout ( — ping-restart)”

2022-11-12 · 3 min · Ally Petitt

What the Pen-200 Has Taught Me About Pentesting Methodology

2022-11-02 · 3 min · Ally Petitt

September  1

How Did an 18-Year-Old Hack Uber?

2022-09-24 · 3 min · Ally Petitt

July  1

How Companies Respond to Cyber Attacks | The 6 Steps of an Incident Response Plan

2022-07-09 · 3 min · Ally Petitt

June  1

Pentester’s Guide to Performing File Transfers

2022-06-08 · 3 min · Ally Petitt

May  2

Antivirus Evasion: What it is and How to do it

2022-05-30 · 3 min · Ally Petitt

Kerberos Authentication Explained

2022-05-25 · 3 min · Ally Petitt

February  1

Mustacchio Walkthrough | Try Hack Me | Ally Petitt

2022-02-18 · 6 min · Ally Petitt