R3V Security
  • Home
  • About
  • Links
  • Projects
  • HtB
  • Misc
  • Writeups
Projects

Bachelor Project: Game-based learning in cyber security

Cyber Security · Game-Based Learning · Java · Bachelor Project May 2024 The Problem Here's a stat that stuck with me: 68% of data breaches involve a non-malicious human element. Not sophisticated zero-day exploits or nation-state hackers breaking through firewalls just regular people clicking the wrong link, reusing passwords, or leaving
16 Apr 2026 5 min read
Misc

This Is How They Tell Me the World Ends

It's genuinely wild when you stop and think about it. Some of the most commonly used exploits in pen-testing and CTF platforms like Hack The Box, things like EternalBlue which underpins the legendary MS17-010 vulnerability, didn't come from security researchers or tool developers. They originally came
15 Apr 2026 1 min read
Misc

Penelope Shell Handler

What Is It? If you've spent any time on Hack The Box, you know the pain. You pop a shell, celebrate for about three seconds, and then the real suffering begins coping with a dumb, non-interactive reverse shell that can't tab-complete, and dies if you sneeze
15 Apr 2026 2 min read
Projects

Android Malware Detection Using Static and Dynamic Techniques

This school project focused on detecting Android malware by analyzing how apps are built and how they behave at runtime. Instead of relying on very large feature sets, the goal was to investigate whether a smaller and more meaningful set of features could still provide reliable and interpretable malware detection
09 Apr 2026 4 min read
Projects

Detecting Runtime Attacks

This project, titled "Runtime Software Attacks," was a my second semester cybersecurity project focused on implementing and detecting runtime control flow attacks, specifically buffer overflow exploits and Return-Oriented Programming (ROP). These attacks are particularly dangerous because they hijack a program's execution using code that's
09 Apr 2026 3 min read
Projects

SECURE BLOCKCHAINS FOR THE SHIPPING INDUSTRY

During my first semester studying my masters degree in cybersecurity at Aalborg University, our team dove into one of the trickiest challenges in global shipping: how to make data more transparent, reliable, and secure. Our project, "Developing a Secure Blockchain System," explored how blockchain technology could tackle inefficiencies,
08 Apr 2026 4 min read
HtB Walkthroughs

Imagery: HackTheBox Medium Box Writeup

Overview Imagery is a Medium-rated Linux machine on HackTheBox that chains together several classic web vulnerabilities in a cool sequence: session token analysis, Cross-Site Scripting (XSS) for session hijacking, and Local File Inclusion (LFI) to pull sensitive files from the server. It's a great box for practising client-side
01 Apr 2026 2 min read
HtB Walkthroughs

Cypher HackTheBox Medium Box Writeup

Overview Cypher is a Medium-rated Linux machine on HackTheBox that lives up to its name. The entire foothold revolves around Cypher Injection against a Neo4j graph database, the graph query language equivalent of SQL injection. The box also features a clever custom procedure abuse for RCE and a sudo misconfiguration
01 Apr 2026 2 min read
HtB Walkthroughs

Expressway HackTheBox Easy Linux Box Writeup

Overview Expressway is an Easy-rated Linux machine on HackTheBox that takes you off the beaten path of typical web enumeration and into the world of VPN protocols. The box centers around IKE/ISAKMP, the protocol behind IPsec VPNs and chains a PSK hash crack with a recent sudo privilege escalation
01 Apr 2026 2 min read
HtB Walkthroughs

Dog HackTheBox Easy Box Writeup

Overview Dog is an Easy-rated Linux machine on HackTheBox that covers a realistic attack chain involving a misconfigured CMS, credential reuse, and a sudo misconfiguration leading to privilege escalation. It's a great box for practicing enumeration and understanding how common web CMS vulnerabilities can be chained together. Enumeration
01 Apr 2026 1 min read
HtB Walkthroughs

Cap - Easy Linux

// writeups / HackTheBox Hack The Box — Machine Writeup Cap. Easy Linux Mar 7, 2026 IDOR · FTP Sniffing · Linux Capabilities Cap is an easy Linux machine hosting a security dashboard with a classic IDOR vulnerability. A network capture exposes FTP credentials in plaintext, granting an initial foothold. Privilege escalation abuses a misconfigured
07 Mar 2026 6 min read
Coming soon
News

Coming soon

Welcome to R3V Security, this blog is just getting started. Soon I'll be posting CTF writeups, Hack The Box machine walkthroughs, notes on tools and techniques I'm learning, and the occasional thoughts on cybersecurity books and other related topics. The goal is simple: document my journey
05 Mar 2026
Page 1 of 1
R3V Security © 2026
flag{y0u_f0und_th3_f00t3r}