<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <generator uri="https://jekyllrb.com/" version="3.10.0">Jekyll</generator>
  <link href="https://robinx0.github.io/feed.xml" rel="self" type="application/atom+xml" />
  <link href="https://robinx0.github.io/" rel="alternate" type="text/html" />
  <updated>2026-05-09T14:10:38+00:00</updated>
  <id>https://robinx0.github.io/feed.xml</id>
  <title type="html">ROBINX0</title>
  <subtitle>Offensive Security Research · Red Team Ops · Writeups</subtitle>
  <author>
    <name>Irfanul Montasir</name>
  </author>

  
  
  <entry>
    <title type="html">AD Privilege Escalation Primitives: Kerberoasting, Shadow Credentials, RBCD, Injection, and BOFs</title>
    <link href="https://robinx0.github.io/blogs/red-team-ops/ad-escalation-primitives/" rel="alternate" type="text/html" title="AD Privilege Escalation Primitives: Kerberoasting, Shadow Credentials, RBCD, Injection, and BOFs" />
    <published>2026-04-19T00:00:00+00:00</published>
    <updated>2026-04-19T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/red-team-ops/ad-escalation-primitives/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">The operator&apos;s toolkit for moving from domain user to domain admin - Kerberoasting → Golden Ticket, Shadow Credentials via msDS-KeyCredentialLink, RBCD via GenericWrite, modern process injection, and Beacon Object Files that tie it all together. Theory, tradecraft, and OPSEC for each primitive.</summary>
    
    
    
    <category term="active-directory" />
    
    <category term="kerberos" />
    
    <category term="rbcd" />
    
    <category term="shadow-credentials" />
    
    <category term="injection" />
    
    <category term="bof" />
    
    <category term="privilege-escalation" />
    
    
  </entry>
  
  <entry>
    <title type="html">Server-Side Web Pentest Playbook: Prototype Pollution, OAuth Flaws, SQLi-to-RCE, and SSRF</title>
    <link href="https://robinx0.github.io/blogs/web-exploitation/server-side-web-pentest-playbook/" rel="alternate" type="text/html" title="Server-Side Web Pentest Playbook: Prototype Pollution, OAuth Flaws, SQLi-to-RCE, and SSRF" />
    <published>2026-04-18T00:00:00+00:00</published>
    <updated>2026-04-18T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/web-exploitation/server-side-web-pentest-playbook/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Four of the highest-impact server-side web vulnerability classes, chained to full compromise. Prototype pollution → RCE via child_process gadgets, OAuth misconfig → account takeover, MSSQL SQLi → SYSTEM via xp_cmdshell + PrintSpoofer, and SSRF → AWS IAM credential theft. Theory, exploitation, and hardening for each.</summary>
    
    
    
    <category term="web" />
    
    <category term="prototype-pollution" />
    
    <category term="oauth" />
    
    <category term="sqli" />
    
    <category term="ssrf" />
    
    <category term="rce" />
    
    <category term="nodejs" />
    
    <category term="aws" />
    
    <category term="cloud" />
    
    
  </entry>
  
  <entry>
    <title type="html">The Userland EDR Bypass Stack: Unhooking, Syscalls, ETW/AMSI, and Kernel Callbacks</title>
    <link href="https://robinx0.github.io/blogs/edr-bypass/userland-edr-bypass-stack/" rel="alternate" type="text/html" title="The Userland EDR Bypass Stack: Unhooking, Syscalls, ETW/AMSI, and Kernel Callbacks" />
    <published>2026-04-17T00:00:00+00:00</published>
    <updated>2026-04-17T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/edr-bypass/userland-edr-bypass-stack/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">A comprehensive guide to the layered techniques that make up modern userland EDR evasion - restoring clean ntdll, dynamic syscall resolution via Hell&apos;s/Halo&apos;s/Tartarus&apos; Gate, indirect syscalls, AMSI/ETW patching, and optional kernel callback removal. Theory, working code, OPSEC, and detection for each layer.</summary>
    
    
    
    <category term="edr-bypass" />
    
    <category term="syscalls" />
    
    <category term="unhooking" />
    
    <category term="amsi" />
    
    <category term="etw" />
    
    <category term="hells-gate" />
    
    <category term="kernel-callbacks" />
    
    <category term="opsec" />
    
    
  </entry>
  
  <entry>
    <title type="html">Building a C2 Stack: Implants, BOF Loaders, Redirectors, and DoH Channels</title>
    <link href="https://robinx0.github.io/blogs/c2-development/c2-stack-build-guide/" rel="alternate" type="text/html" title="Building a C2 Stack: Implants, BOF Loaders, Redirectors, and DoH Channels" />
    <published>2026-04-17T00:00:00+00:00</published>
    <updated>2026-04-17T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/c2-development/c2-stack-build-guide/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">A practical end-to-end guide to building command-and-control infrastructure - a minimal Rust implant, a COFF-parsing BOF loader, resilient redirector chains, and a DNS-over-HTTPS covert channel. How each layer fits together and where OPSEC attention actually pays off.</summary>
    
    
    
    <category term="c2" />
    
    <category term="rust" />
    
    <category term="bof" />
    
    <category term="coff" />
    
    <category term="redirectors" />
    
    <category term="domain-fronting" />
    
    <category term="doh" />
    
    <category term="opsec" />
    
    
  </entry>
  
  <entry>
    <title type="html">DCSync and DCShadow: Abusing Replication Rights for Credential Theft and Persistence</title>
    <link href="https://robinx0.github.io/blogs/red-team-ops/dcsync-dcshadow-operations/" rel="alternate" type="text/html" title="DCSync and DCShadow: Abusing Replication Rights for Credential Theft and Persistence" />
    <published>2026-04-16T00:00:00+00:00</published>
    <updated>2026-04-16T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/red-team-ops/dcsync-dcshadow-operations/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">A complete operator guide to DCSync and DCShadow - the replication APIs MS-DRSR opens up, how to abuse them for NTDS extraction and stealth object modification, and what actually shows up in the 4662 event log.</summary>
    
    
    
    <category term="active-directory" />
    
    <category term="dcsync" />
    
    <category term="dcshadow" />
    
    <category term="persistence" />
    
    <category term="mimikatz" />
    
    <category term="impacket" />
    
    
  </entry>
  
  <entry>
    <title type="html">Hardware Breakpoint Hooking: Bypassing Inline EDR Hooks Without Touching Memory</title>
    <link href="https://robinx0.github.io/blogs/edr-bypass/hardware-breakpoint-hooking/" rel="alternate" type="text/html" title="Hardware Breakpoint Hooking: Bypassing Inline EDR Hooks Without Touching Memory" />
    <published>2026-04-14T00:00:00+00:00</published>
    <updated>2026-04-14T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/edr-bypass/hardware-breakpoint-hooking/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">A practical C++ guide to using x86-64 debug registers (DR0-DR7) for user-mode API hooking - how EDRs are blind to hardware breakpoints, when HWBPs beat patching, and how to build a minimal HWBP engine.</summary>
    
    
    
    <category term="edr-bypass" />
    
    <category term="hardware-breakpoints" />
    
    <category term="hooking" />
    
    <category term="windows" />
    
    <category term="c++" />
    
    
  </entry>
  
  <entry>
    <title type="html">JWT Algorithm Confusion: None, HS256/RS256 Mix-Ups, and KID Injection</title>
    <link href="https://robinx0.github.io/blogs/web-exploitation/jwt-algorithm-confusion/" rel="alternate" type="text/html" title="JWT Algorithm Confusion: None, HS256/RS256 Mix-Ups, and KID Injection" />
    <published>2026-04-11T00:00:00+00:00</published>
    <updated>2026-04-11T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/web-exploitation/jwt-algorithm-confusion/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">A hands-on tour of the JWT attack surface - from the classic alg:none to public-key-as-HMAC-secret confusion, KID path traversal and SQLi, JWK header injection, and weak HS256 secret cracking. With jwt_tool payloads and real exploitation paths.</summary>
    
    
    
    <category term="jwt" />
    
    <category term="web" />
    
    <category term="authentication" />
    
    <category term="api" />
    
    <category term="cryptography" />
    
    
  </entry>
  
  <entry>
    <title type="html">Beacon Object Files from Scratch: COFF Loading, Dynamic Resolution, and Battle-Tested Tradecraft</title>
    <link href="https://robinx0.github.io/blogs/c2-development/beacon-object-files-guide/" rel="alternate" type="text/html" title="Beacon Object Files from Scratch: COFF Loading, Dynamic Resolution, and Battle-Tested Tradecraft" />
    <published>2026-04-09T00:00:00+00:00</published>
    <updated>2026-04-09T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/c2-development/beacon-object-files-guide/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">A deep guide to writing Beacon Object Files - from understanding the COFF format and Cobalt Strike&apos;s BOF runtime to building a production-grade token-duplication BOF with BeaconPrintf, dynamic function resolution, and thread-safe cleanup.</summary>
    
    
    
    <category term="c2" />
    
    <category term="cobalt-strike" />
    
    <category term="bof" />
    
    <category term="coff" />
    
    <category term="windows" />
    
    <category term="tradecraft" />
    
    
  </entry>
  
  <entry>
    <title type="html">Coerced Authentication Attacks: PetitPotam, PrinterBug, DFSCoerce, and the ADCS ESC8 Chain</title>
    <link href="https://robinx0.github.io/blogs/network-security/coerced-authentication-attacks/" rel="alternate" type="text/html" title="Coerced Authentication Attacks: PetitPotam, PrinterBug, DFSCoerce, and the ADCS ESC8 Chain" />
    <published>2026-04-07T00:00:00+00:00</published>
    <updated>2026-04-07T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/network-security/coerced-authentication-attacks/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">A practical guide to authentication coercion in Active Directory - the four RPC primitives that force a remote host to authenticate to you, how to chain them with NTLM relay to ADCS, and why patched doesn&apos;t always mean fixed.</summary>
    
    
    
    <category term="active-directory" />
    
    <category term="ntlm" />
    
    <category term="adcs" />
    
    <category term="petitpotam" />
    
    <category term="printerbug" />
    
    <category term="relay" />
    
    
  </entry>
  
  <entry>
    <title type="html">Sleep Obfuscation Deep Dive: Ekko, Zilean, and Foliage</title>
    <link href="https://robinx0.github.io/blogs/edr-bypass/sleep-obfuscation-techniques/" rel="alternate" type="text/html" title="Sleep Obfuscation Deep Dive: Ekko, Zilean, and Foliage" />
    <published>2026-03-29T00:00:00+00:00</published>
    <updated>2026-03-29T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/edr-bypass/sleep-obfuscation-techniques/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Advanced sleep obfuscation techniques that encrypt implant memory during sleep cycles to evade EDR memory scanning - covering Ekko, Zilean, Foliage, and custom implementations.</summary>
    
    
    
    <category term="sleep-obfuscation" />
    
    <category term="ekko" />
    
    <category term="zilean" />
    
    <category term="foliage" />
    
    <category term="edr-evasion" />
    
    <category term="opsec" />
    
    
  </entry>
  
  <entry>
    <title type="html">ADCS Abuse: ESC1 Through ESC8 Attack Paths</title>
    <link href="https://robinx0.github.io/blogs/network-security/adcs-abuse/" rel="alternate" type="text/html" title="ADCS Abuse: ESC1 Through ESC8 Attack Paths" />
    <published>2026-03-27T00:00:00+00:00</published>
    <updated>2026-03-27T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/network-security/adcs-abuse/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Comprehensive guide to Active Directory Certificate Services misconfigurations - from ESC1 template abuse to NTLM relay on HTTP enrollment. Covers PKINIT internals, the full ESC1-ESC11 catalogue, exploitation tooling, and audit/remediation strategy.</summary>
    
    
    
    <category term="adcs" />
    
    <category term="certificates" />
    
    <category term="pkinit" />
    
    <category term="active-directory" />
    
    
  </entry>
  
  <entry>
    <title type="html">Call Stack Spoofing: Defeating EDR Stack Telemetry</title>
    <link href="https://robinx0.github.io/blogs/edr-bypass/stack-spoofing-techniques/" rel="alternate" type="text/html" title="Call Stack Spoofing: Defeating EDR Stack Telemetry" />
    <published>2026-03-25T00:00:00+00:00</published>
    <updated>2026-03-25T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/edr-bypass/stack-spoofing-techniques/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Advanced techniques for spoofing thread call stacks to evade EDR behavioral detection - covering return address spoofing, synthetic frames, and thread stack manipulation.</summary>
    
    
    
    <category term="stack-spoofing" />
    
    <category term="edr-evasion" />
    
    <category term="call-stack" />
    
    <category term="return-address" />
    
    <category term="windows-internals" />
    
    
  </entry>
  
  <entry>
    <title type="html">Active Directory Attack Methodology: Initial Access to Domain Admin</title>
    <link href="https://robinx0.github.io/blogs/red-team-ops/full-ad-attack-methodology/" rel="alternate" type="text/html" title="Active Directory Attack Methodology: Initial Access to Domain Admin" />
    <published>2026-03-23T00:00:00+00:00</published>
    <updated>2026-03-23T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/red-team-ops/full-ad-attack-methodology/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">A complete red team playbook for Active Directory environments - from initial foothold through lateral movement, privilege escalation, and domain dominance with practical tool usage.</summary>
    
    
    
    <category term="active-directory" />
    
    <category term="methodology" />
    
    <category term="lateral-movement" />
    
    <category term="bloodhound" />
    
    <category term="cobalt-strike" />
    
    
  </entry>
  
  <entry>
    <title type="html">Designing a Modern C2 Implant: Architecture and OPSEC</title>
    <link href="https://robinx0.github.io/blogs/c2-development/implant-architecture-guide/" rel="alternate" type="text/html" title="Designing a Modern C2 Implant: Architecture and OPSEC" />
    <published>2026-03-20T00:00:00+00:00</published>
    <updated>2026-03-20T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/c2-development/implant-architecture-guide/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">A comprehensive guide to C2 implant architecture - covering communication protocols, execution models, sleep patterns, anti-forensics, and operational security considerations.</summary>
    
    
    
    <category term="c2" />
    
    <category term="implant" />
    
    <category term="architecture" />
    
    <category term="opsec" />
    
    <category term="red-team" />
    
    
  </entry>
  
  <entry>
    <title type="html">Active Directory ACL Abuse: Every Attack Path Explained</title>
    <link href="https://robinx0.github.io/blogs/red-team-ops/ad-acl-abuse-complete-guide/" rel="alternate" type="text/html" title="Active Directory ACL Abuse: Every Attack Path Explained" />
    <published>2026-03-17T00:00:00+00:00</published>
    <updated>2026-03-17T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/red-team-ops/ad-acl-abuse-complete-guide/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Comprehensive guide to exploiting Active Directory Access Control List misconfigurations - GenericAll, GenericWrite, WriteDacl, WriteOwner, ForceChangePassword, and dangerous extended rights.</summary>
    
    
    
    <category term="active-directory" />
    
    <category term="acl" />
    
    <category term="bloodhound" />
    
    <category term="dacl" />
    
    <category term="privilege-escalation" />
    
    
  </entry>
  
  <entry>
    <title type="html">Reflective DLL Injection: Theory &amp; Practice</title>
    <link href="https://robinx0.github.io/blogs/malware-analysis/reflective-dll/" rel="alternate" type="text/html" title="Reflective DLL Injection: Theory &amp; Practice" />
    <published>2026-03-12T00:00:00+00:00</published>
    <updated>2026-03-12T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/malware-analysis/reflective-dll/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Understanding reflective DLL loading - manually mapping a PE in memory without disk or LoadLibrary, with a complete walkthrough of the bootstrap, header parsing, section mapping, relocation fixups, import resolution, and modern OPSEC improvements.</summary>
    
    
    
    <category term="dll-injection" />
    
    <category term="reflective-loading" />
    
    <category term="in-memory" />
    
    <category term="pe-loading" />
    
    <category term="veh" />
    
    <category term="mockingjay" />
    
    <category term="dll-hijacking" />
    
    
  </entry>
  
  <entry>
    <title type="html">.NET RAT Unpacking &amp; C2 Protocol Extraction</title>
    <link href="https://robinx0.github.io/blogs/malware-analysis/dotnet-rat-unpacking/" rel="alternate" type="text/html" title=".NET RAT Unpacking &amp; C2 Protocol Extraction" />
    <published>2026-03-10T00:00:00+00:00</published>
    <updated>2026-03-10T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/malware-analysis/dotnet-rat-unpacking/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Static and dynamic analysis of an obfuscated .NET RAT - deobfuscation, behavioral analysis, and YARA signatures. Covers ConfuserEx unpacking, dnSpy/dnSpyEx workflow, anti-analysis defeat, custom protocol reverse-engineering, and detection authoring.</summary>
    
    
    
    <category term="dotnet" />
    
    <category term="rat" />
    
    <category term="dnspy" />
    
    <category term="deobfuscation" />
    
    <category term="yara" />
    
    
  </entry>
  
  <entry>
    <title type="html">Android Runtime Hooking with Frida</title>
    <link href="https://robinx0.github.io/blogs/mobile-security/frida-android-hooking/" rel="alternate" type="text/html" title="Android Runtime Hooking with Frida" />
    <published>2026-03-08T00:00:00+00:00</published>
    <updated>2026-03-08T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/mobile-security/frida-android-hooking/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Using Frida to bypass SSL pinning, defeat root detection, intercept crypto operations, and hook JNI native functions - complete coverage of Java-side and native-side instrumentation, the universal hook patterns, and modern anti-Frida defeat techniques.</summary>
    
    
    
    <category term="frida" />
    
    <category term="android" />
    
    <category term="hooking" />
    
    <category term="ssl-pinning" />
    
    <category term="root-detection" />
    
    
  </entry>
  
  <entry>
    <title type="html">Bypassing Android Biometric Authentication via Frida</title>
    <link href="https://robinx0.github.io/blogs/mobile-security/android-biometric-bypass/" rel="alternate" type="text/html" title="Bypassing Android Biometric Authentication via Frida" />
    <published>2026-03-07T00:00:00+00:00</published>
    <updated>2026-03-07T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/mobile-security/android-biometric-bypass/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Hooking BiometricPrompt callbacks and CryptoObject to bypass fingerprint/face authentication in Android banking apps - covering the full BiometricPrompt API, KeyStore-backed gating, hardware-backed strong biometrics, and a practical Frida bypass chain.</summary>
    
    
    
    <category term="biometric" />
    
    <category term="frida" />
    
    <category term="android" />
    
    <category term="bypass" />
    
    <category term="banking" />
    
    
  </entry>
  
  <entry>
    <title type="html">NTLM Relay to LDAP: Domain Takeover</title>
    <link href="https://robinx0.github.io/blogs/network-security/ntlm-relay-ldap/" rel="alternate" type="text/html" title="NTLM Relay to LDAP: Domain Takeover" />
    <published>2026-03-05T00:00:00+00:00</published>
    <updated>2026-03-05T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/network-security/ntlm-relay-ldap/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Using PetitPotam to coerce DC authentication and relay to LDAP for domain compromise via RBCD - full coverage of the LDAP-signing prerequisite, ntlmrelayx tooling, the post-relay RBCD chain, and the modern detection/mitigation landscape.</summary>
    
    
    
    <category term="ntlm" />
    
    <category term="relay" />
    
    <category term="ldap" />
    
    <category term="petitpotam" />
    
    <category term="active-directory" />
    
    
  </entry>
  
  <entry>
    <title type="html">Extracting Cobalt Strike Beacon Configuration</title>
    <link href="https://robinx0.github.io/blogs/malware-analysis/cobalt-strike-beacon-analysis/" rel="alternate" type="text/html" title="Extracting Cobalt Strike Beacon Configuration" />
    <published>2026-03-05T00:00:00+00:00</published>
    <updated>2026-03-05T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/malware-analysis/cobalt-strike-beacon-analysis/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Static and dynamic techniques for identifying Cobalt Strike beacons, extracting C2 configs, and generating detection signatures - covering the configuration block format, parser internals, malleable C2 fingerprinting, and YARA strategy.</summary>
    
    
    
    <category term="cobalt-strike" />
    
    <category term="beacon" />
    
    <category term="config-extraction" />
    
    <category term="threat-intel" />
    
    
  </entry>
  
  <entry>
    <title type="html">Unpacking Malware: From UPX to Custom Crypters</title>
    <link href="https://robinx0.github.io/blogs/malware-analysis/unpacking-packed-malware/" rel="alternate" type="text/html" title="Unpacking Malware: From UPX to Custom Crypters" />
    <published>2026-03-02T00:00:00+00:00</published>
    <updated>2026-03-02T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/malware-analysis/unpacking-packed-malware/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">A systematic approach to identifying and unpacking packed malware - covering UPX, Themida, custom packers, and manual unpacking techniques with x64dbg.</summary>
    
    
    
    <category term="unpacking" />
    
    <category term="packing" />
    
    <category term="upx" />
    
    <category term="themida" />
    
    <category term="x64dbg" />
    
    <category term="pe-format" />
    
    
  </entry>
  
  <entry>
    <title type="html">Anti-Analysis Techniques: How Malware Detects Your Sandbox</title>
    <link href="https://robinx0.github.io/blogs/malware-analysis/anti-analysis-techniques/" rel="alternate" type="text/html" title="Anti-Analysis Techniques: How Malware Detects Your Sandbox" />
    <published>2026-02-28T00:00:00+00:00</published>
    <updated>2026-02-28T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/malware-analysis/anti-analysis-techniques/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Comprehensive catalog of VM detection, sandbox evasion, debugger detection, and timing-based anti-analysis techniques - with concrete code, the rationale behind each check, and counter-measures for analysts hardening their lab.</summary>
    
    
    
    <category term="anti-analysis" />
    
    <category term="sandbox-evasion" />
    
    <category term="vm-detection" />
    
    <category term="debugging" />
    
    
  </entry>
  
  <entry>
    <title type="html">Kerberos Delegation Attacks: Unconstrained, Constrained, RBCD</title>
    <link href="https://robinx0.github.io/blogs/network-security/kerberos-delegation-attacks/" rel="alternate" type="text/html" title="Kerberos Delegation Attacks: Unconstrained, Constrained, RBCD" />
    <published>2026-02-25T00:00:00+00:00</published>
    <updated>2026-02-25T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/network-security/kerberos-delegation-attacks/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Understanding and exploiting all three Kerberos delegation types for lateral movement and privilege escalation in Active Directory - full coverage of the S4U2Self / S4U2Proxy protocol, coercion primitives, RBCD via GenericWrite, and the post-ms16-014 mitigation landscape.</summary>
    
    
    
    <category term="kerberos" />
    
    <category term="delegation" />
    
    <category term="rbcd" />
    
    <category term="s4u" />
    
    <category term="active-directory" />
    
    
  </entry>
  
  <entry>
    <title type="html">Java Deserialization Attacks: From Gadget Chains to RCE</title>
    <link href="https://robinx0.github.io/blogs/web-exploitation/java-deserialization-rce/" rel="alternate" type="text/html" title="Java Deserialization Attacks: From Gadget Chains to RCE" />
    <published>2026-02-25T00:00:00+00:00</published>
    <updated>2026-02-25T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/web-exploitation/java-deserialization-rce/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Understanding and exploiting Java deserialization vulnerabilities - identifying vulnerable endpoints, building gadget chains with ysoserial, and exploiting real-world applications.</summary>
    
    
    
    <category term="java" />
    
    <category term="deserialization" />
    
    <category term="ysoserial" />
    
    <category term="gadget-chains" />
    
    <category term="rce" />
    
    
  </entry>
  
  <entry>
    <title type="html">Shellcode Analysis: Tips, Tricks &amp; Common Patterns</title>
    <link href="https://robinx0.github.io/blogs/malware-analysis/shellcode-analysis/" rel="alternate" type="text/html" title="Shellcode Analysis: Tips, Tricks &amp; Common Patterns" />
    <published>2026-02-22T00:00:00+00:00</published>
    <updated>2026-02-22T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/malware-analysis/shellcode-analysis/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">A practical guide to analyzing shellcode - identifying encoders, emulation, and recognizing common patterns. Covers triage, PEB walking, hash-based API resolution, scdbg/SpeakEasy emulation, and family-level pattern recognition.</summary>
    
    
    
    <category term="shellcode" />
    
    <category term="x64" />
    
    <category term="emulation" />
    
    <category term="scdbg" />
    
    <category term="analysis" />
    
    
  </entry>
  
  <entry>
    <title type="html">LLMNR/NBT-NS Poisoning with Responder</title>
    <link href="https://robinx0.github.io/blogs/network-security/responder-poisoning/" rel="alternate" type="text/html" title="LLMNR/NBT-NS Poisoning with Responder" />
    <published>2026-02-20T00:00:00+00:00</published>
    <updated>2026-02-20T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/network-security/responder-poisoning/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Capturing NTLMv2 hashes on enterprise networks by poisoning LLMNR, NBT-NS, and MDNS multicast name resolution - the protocol details, Responder configuration, hash format walk-through, cracking strategy, and SMB-signing-aware relay alternatives.</summary>
    
    
    
    <category term="responder" />
    
    <category term="ntlm" />
    
    <category term="llmnr" />
    
    <category term="nbt-ns" />
    
    <category term="hash-capture" />
    
    
  </entry>
  
  <entry>
    <title type="html">Ret2Libc: Bypassing NX Protection</title>
    <link href="https://robinx0.github.io/blogs/binary-exploitation/ret2libc/" rel="alternate" type="text/html" title="Ret2Libc: Bypassing NX Protection" />
    <published>2026-02-18T00:00:00+00:00</published>
    <updated>2026-02-18T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/binary-exploitation/ret2libc/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Exploiting a stack buffer overflow with NX enabled using GOT leaking and return-to-libc - a complete two-stage exploit covering libc identification, ASLR defeat via PLT/GOT leak, calling-convention setup, and reliable shell.</summary>
    
    
    
    <category term="buffer-overflow" />
    
    <category term="ret2libc" />
    
    <category term="nx-bypass" />
    
    <category term="got-leak" />
    
    <category term="rop" />
    
    
  </entry>
  
  <entry>
    <title type="html">NTLM Relay Attacks: A Comprehensive Guide</title>
    <link href="https://robinx0.github.io/blogs/network-security/ntlm-relay-comprehensive/" rel="alternate" type="text/html" title="NTLM Relay Attacks: A Comprehensive Guide" />
    <published>2026-02-18T00:00:00+00:00</published>
    <updated>2026-02-18T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/network-security/ntlm-relay-comprehensive/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Everything about NTLM relay - from theory to exploitation. Covering relay to SMB, LDAP, MSSQL, ADCS HTTP, and SCCM with practical tooling and real-world attack chains.</summary>
    
    
    
    <category term="ntlm-relay" />
    
    <category term="coercion" />
    
    <category term="petitpotam" />
    
    <category term="smb-signing" />
    
    <category term="active-directory" />
    
    
  </entry>
  
  <entry>
    <title type="html">Heap Exploitation 101: Tcache Poisoning on glibc 2.35</title>
    <link href="https://robinx0.github.io/blogs/binary-exploitation/heap-tcache-poisoning/" rel="alternate" type="text/html" title="Heap Exploitation 101: Tcache Poisoning on glibc 2.35" />
    <published>2026-02-15T00:00:00+00:00</published>
    <updated>2026-02-15T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/binary-exploitation/heap-tcache-poisoning/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Understanding tcache internals and poisoning the freelist for arbitrary write on modern glibc - covering safe-linking, heap and libc leaks, and a complete exploit walk-through against a use-after-free.</summary>
    
    
    
    <category term="heap" />
    
    <category term="tcache" />
    
    <category term="glibc" />
    
    <category term="use-after-free" />
    
    <category term="arbitrary-write" />
    
    
  </entry>
  
  <entry>
    <title type="html">Android APK Reverse Engineering: From APK to Source</title>
    <link href="https://robinx0.github.io/blogs/mobile-security/apk-reverse-engineering/" rel="alternate" type="text/html" title="Android APK Reverse Engineering: From APK to Source" />
    <published>2026-02-15T00:00:00+00:00</published>
    <updated>2026-02-15T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/mobile-security/apk-reverse-engineering/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Complete guide to decompiling, analyzing, and patching Android applications using jadx, apktool, and smali - covering APK structure, native libraries, manifest analysis, common security flaws, and the full patch-rebuild-resign workflow.</summary>
    
    
    
    <category term="android" />
    
    <category term="reverse-engineering" />
    
    <category term="jadx" />
    
    <category term="apktool" />
    
    <category term="smali" />
    
    
  </entry>
  
  <entry>
    <title type="html">Stack Canary Bypass via Format String Vulnerability</title>
    <link href="https://robinx0.github.io/blogs/binary-exploitation/format-string-canary-bypass/" rel="alternate" type="text/html" title="Stack Canary Bypass via Format String Vulnerability" />
    <published>2026-02-12T00:00:00+00:00</published>
    <updated>2026-02-12T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/binary-exploitation/format-string-canary-bypass/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Using format string bugs to leak stack canaries, then exploiting the buffer overflow with the leaked value - covering canary internals, format-string read primitives, offset discovery, and the full chained exploit.</summary>
    
    
    
    <category term="format-string" />
    
    <category term="canary-bypass" />
    
    <category term="stack" />
    
    <category term="exploitation" />
    
    
  </entry>
  
  <entry>
    <title type="html">Intercepting Flutter App Traffic with Frida</title>
    <link href="https://robinx0.github.io/blogs/mobile-security/flutter-traffic-interception/" rel="alternate" type="text/html" title="Intercepting Flutter App Traffic with Frida" />
    <published>2026-02-10T00:00:00+00:00</published>
    <updated>2026-02-10T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/mobile-security/flutter-traffic-interception/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Bypassing Flutter&apos;s custom TLS stack to intercept HTTPS traffic that ignores system proxy settings and certificate stores - a deep look at why Flutter is harder than native, plus reFlutter, Frida, and iptables-based interception strategies.</summary>
    
    
    
    <category term="flutter" />
    
    <category term="frida" />
    
    <category term="ssl-pinning" />
    
    <category term="traffic-interception" />
    
    
  </entry>
  
  <entry>
    <title type="html">x64 ROP Chains: Systematic Gadget Hunting</title>
    <link href="https://robinx0.github.io/blogs/binary-exploitation/rop-x64-gadget-hunting/" rel="alternate" type="text/html" title="x64 ROP Chains: Systematic Gadget Hunting" />
    <published>2026-02-08T00:00:00+00:00</published>
    <updated>2026-02-08T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/binary-exploitation/rop-x64-gadget-hunting/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Building ROP chains on x64 Linux - finding gadgets with ropper, handling calling conventions, chaining syscalls, dealing with bad characters, stack alignment, and a complete worked example.</summary>
    
    
    
    <category term="rop" />
    
    <category term="x64" />
    
    <category term="gadgets" />
    
    <category term="ropper" />
    
    <category term="pwntools" />
    
    
  </entry>
  
  <entry>
    <title type="html">The Complete Guide to Android SSL Pinning Bypass</title>
    <link href="https://robinx0.github.io/blogs/mobile-security/complete-ssl-pinning-bypass/" rel="alternate" type="text/html" title="The Complete Guide to Android SSL Pinning Bypass" />
    <published>2026-02-05T00:00:00+00:00</published>
    <updated>2026-02-05T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/mobile-security/complete-ssl-pinning-bypass/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Every technique for bypassing SSL certificate pinning on Android - from network_security_config to OkHttp, TrustManager, Flutter, React Native, Xamarin, and native C++ implementations.</summary>
    
    
    
    <category term="android" />
    
    <category term="ssl-pinning" />
    
    <category term="frida" />
    
    <category term="certificate" />
    
    <category term="traffic-interception" />
    
    
  </entry>
  
  <entry>
    <title type="html">Heap Feng Shui: Controlling Memory Layout for Exploitation</title>
    <link href="https://robinx0.github.io/blogs/binary-exploitation/heap-feng-shui-exploitation/" rel="alternate" type="text/html" title="Heap Feng Shui: Controlling Memory Layout for Exploitation" />
    <published>2026-02-01T00:00:00+00:00</published>
    <updated>2026-02-01T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/binary-exploitation/heap-feng-shui-exploitation/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Advanced heap exploitation techniques - understanding allocator internals, shaping heap layout, and achieving reliable exploitation through careful allocation patterns on glibc and Windows.</summary>
    
    
    
    <category term="heap" />
    
    <category term="feng-shui" />
    
    <category term="glibc" />
    
    <category term="exploitation" />
    
    <category term="use-after-free" />
    
    
  </entry>
  
  <entry>
    <title type="html">My CRTO Exam Review: Cobalt Strike, Malleable Profiles, and Adversary Simulation</title>
    <link href="https://robinx0.github.io/blogs/cert-reviews/crto-review/" rel="alternate" type="text/html" title="My CRTO Exam Review: Cobalt Strike, Malleable Profiles, and Adversary Simulation" />
    <published>2025-12-10T00:00:00+00:00</published>
    <updated>2025-12-10T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/cert-reviews/crto-review/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Honest review of Zero-Point Security&apos;s Certified Red Team Operator certification - the course content, malleable C2 profile development, AV evasion techniques, and the lateral-movement wall I hit on the exam.</summary>
    
    
    
    <category term="crto" />
    
    <category term="zero-point-security" />
    
    <category term="cobalt-strike" />
    
    <category term="red-team" />
    
    <category term="certification" />
    
    <category term="exam-review" />
    
    
  </entry>
  
  <entry>
    <title type="html">Forged in Fortresses: My Complete HackTheBox CPTS Journey</title>
    <link href="https://robinx0.github.io/blogs/cert-reviews/cpts-journey/" rel="alternate" type="text/html" title="Forged in Fortresses: My Complete HackTheBox CPTS Journey" />
    <published>2025-06-04T00:00:00+00:00</published>
    <updated>2025-06-04T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/cert-reviews/cpts-journey/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">A deep dive into my preparation, strategy, and lessons learned earning the HackTheBox Certified Penetration Testing Specialist certification - the most challenging hands-on exam I&apos;ve attempted.</summary>
    
    
    
    <category term="cpts" />
    
    <category term="hackthebox" />
    
    <category term="certification" />
    
    <category term="penetration-testing" />
    
    <category term="exam-review" />
    
    
  </entry>
  
  <entry>
    <title type="html">IIUC CyberCon 2022: CTF Challenge Solutions</title>
    <link href="https://robinx0.github.io/blogs/ctf-writeups/iiuc-cybercon-2022/" rel="alternate" type="text/html" title="IIUC CyberCon 2022: CTF Challenge Solutions" />
    <published>2025-01-24T00:00:00+00:00</published>
    <updated>2025-01-24T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/ctf-writeups/iiuc-cybercon-2022/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Solutions for challenges from the IIUC CyberCon 2022 CTF organized by IIUC Cyber Analyst Team (CyberWiz) - covering web exploitation, forensics with Volatility, classic crypto on small-exponent RSA, and the broader event experience.</summary>
    
    
    
    <category term="ctf" />
    
    <category term="iiuc" />
    
    <category term="cybercon" />
    
    <category term="forensics" />
    
    <category term="web" />
    
    
  </entry>
  
  <entry>
    <title type="html">HackTheBox Watersnake Challenge: YAML Deserialization to RCE</title>
    <link href="https://robinx0.github.io/blogs/ctf-writeups/htb-watersnake-writeup/" rel="alternate" type="text/html" title="HackTheBox Watersnake Challenge: YAML Deserialization to RCE" />
    <published>2024-11-07T00:00:00+00:00</published>
    <updated>2024-11-07T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/ctf-writeups/htb-watersnake-writeup/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Complete walkthrough of the HackTheBox Watersnake challenge - exploiting a YAML deserialization vulnerability in a water tank monitoring dashboard&apos;s firmware update feature.</summary>
    
    
    
    <category term="hackthebox" />
    
    <category term="yaml-deserialization" />
    
    <category term="web" />
    
    <category term="ctf" />
    
    <category term="python" />
    
    
  </entry>
  
  <entry>
    <title type="html">My eCPPTv2 Exam Review: Pivoting Through the Pain</title>
    <link href="https://robinx0.github.io/blogs/cert-reviews/ecpptv2-review/" rel="alternate" type="text/html" title="My eCPPTv2 Exam Review: Pivoting Through the Pain" />
    <published>2024-04-09T00:00:00+00:00</published>
    <updated>2024-04-09T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/cert-reviews/ecpptv2-review/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Comprehensive review of the INE Security eCPPTv2 certification exam - preparation approach, pivoting challenges, buffer overflow section, report writing, and honest tips for passing.</summary>
    
    
    
    <category term="ecpptv2" />
    
    <category term="ine-security" />
    
    <category term="certification" />
    
    <category term="pivoting" />
    
    <category term="penetration-testing" />
    
    
  </entry>
  
  <entry>
    <title type="html">BlackHat MEA 2023 CTF Finals: Reverse Engineering Writeup</title>
    <link href="https://robinx0.github.io/blogs/ctf-writeups/blackhat-mea-2023-reverse/" rel="alternate" type="text/html" title="BlackHat MEA 2023 CTF Finals: Reverse Engineering Writeup" />
    <published>2023-12-25T00:00:00+00:00</published>
    <updated>2023-12-25T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/ctf-writeups/blackhat-mea-2023-reverse/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Detailed writeup of the Ground Hog Day reverse engineering challenge from the BlackHat MEA 2023 CTF final round in Riyadh - binary analysis, function recovery, and flag extraction.</summary>
    
    
    
    <category term="blackhat-mea" />
    
    <category term="ctf" />
    
    <category term="reverse-engineering" />
    
    <category term="ghidra" />
    
    <category term="gdb" />
    
    <category term="binary-analysis" />
    
    
  </entry>
  
  <entry>
    <title type="html">BlueHens UDCTF 2023: Hardware &amp; Reverse Engineering Writeups</title>
    <link href="https://robinx0.github.io/blogs/ctf-writeups/bluehens-udctf-2023-hardware-reverse/" rel="alternate" type="text/html" title="BlueHens UDCTF 2023: Hardware &amp; Reverse Engineering Writeups" />
    <published>2023-10-30T00:00:00+00:00</published>
    <updated>2023-10-30T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/ctf-writeups/bluehens-udctf-2023-hardware-reverse/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Solutions for the Locked Circuit hardware challenge and ElectroNes reverse engineering challenge from the BlueHens UDCTF 2023 competition.</summary>
    
    
    
    <category term="udctf" />
    
    <category term="bluehens" />
    
    <category term="ctf" />
    
    <category term="hardware" />
    
    <category term="reverse-engineering" />
    
    <category term="nes" />
    
    
  </entry>
  
  <entry>
    <title type="html">National Cyber Drill 2021: Reverse Engineering Challenges</title>
    <link href="https://robinx0.github.io/blogs/ctf-writeups/national-cyberdrill-2021-reverse/" rel="alternate" type="text/html" title="National Cyber Drill 2021: Reverse Engineering Challenges" />
    <published>2021-12-13T00:00:00+00:00</published>
    <updated>2021-12-13T00:00:00+00:00</updated>
    <id>https://robinx0.github.io/blogs/ctf-writeups/national-cyberdrill-2021-reverse/</id>
    <author>
      <name>Irfanul Montasir</name>
    </author>
    
    <summary type="html">Detailed writeups for the reverse engineering challenges from Bangladesh&apos;s National Cyber Drill 2021 organized by BGD e-GOV CIRT - binary analysis, GDB debugging, and flag extraction.</summary>
    
    
    
    <category term="cyberdrill" />
    
    <category term="ctf" />
    
    <category term="reverse-engineering" />
    
    <category term="gdb" />
    
    <category term="ghidra" />
    
    <category term="bangladesh" />
    
    
  </entry>
  
</feed>
