/ about

A student who breaks things
for a grade.

Offensive security student at Hogeschool Utrecht. 24 years old. Most at home inside an Active Directory that wishes I wasn't.

My primary playground is HackTheBox50+ machines across Easy → Insane. I write everything up after the box retires, because the lesson lives in the explanation, not the root flag.

On the Windows side: Kerberos abuse — AS-REP, Kerberoast, delegation chains — BloodHound path-finding, NTLM relay, and certificate services abuse. I run a Server 2022 DC and two workstations at home, so nothing I do on HTB feels unfamiliar when I sit down at it.

On Linux: privesc through weak services, SUID chains, misconfigured cron. On the web: SQLi, SSRF, auth bypass, chained logic bugs. Burp as a scalpel — not a shotgun.

I glue my recon together with Python: nmap, ffuf, gobuster piped into a single report template. Currently grinding CCNA because the best attackers actually understand the network they're living in. Next on the cert list: CJCA and CPTS.

01 · win
Active Directory
Kerberos abuse, BloodHound paths, NTLM relay, certificate services, full domain compromise.
02 · web
Web Exploitation
SQLi, SSRF, auth bypass, chained logic flaws via Burp Suite as a scalpel.
03 · priv
Privilege Escalation
Linux + Windows — weak services, SUID chains, DLL hijack, token impersonation.
04 · hash
Password Attacks
Hashcat rules, Responder, Pass-the-Hash, credential hunting on AD.
05 · code
Python Automation
Recon orchestration — nmap + ffuf + gobuster into a single pipeline.
06 · net
Networking
CCNA in progress — routing, VLANs, ACLs, the plumbing under every box.
Copied