Personal Security Blog

Thinking out loud
about cybersecurity.

A UK-based enthusiast's space for threat intelligence, penetration testing, CTF write-ups, privacy deep-dives, and everything in between. No fluff — just the craft.

Browse All Posts About Me
40+ Posts Published
12 CTF Write-ups
7 Topics Covered
5 years Experience
Featured
Threat Intel Analysis

Inside a Modern Ransomware Campaign: Anatomy of a Multi-Stage Attack

A deep-dive into the infrastructure, tooling, and TTPs behind a recent ransomware campaign targeting UK-based organisations — how it unfolded, what defenders missed, and what the forensics revealed.

Read Post →

Recent Posts

View All →
Pen Testing

Active Directory Misconfiguration Hunting with BloodHound

How to systematically map privilege escalation paths in enterprise AD environments using BloodHound and custom Cypher queries.

⏲ 10 min read Read →
CTF

HackTheBox: Forest — A Complete Walkthrough

Full write-up for the Forest machine — covering Kerberoasting, AS-REP roasting, and DCSync to achieve domain compromise.

⏲ 8 min read Read →
OpSec

Your VPN Isn't a Silver Bullet — The Real Privacy Stack

Breaking down the common misconceptions around privacy tooling and building a realistic, layered approach to digital privacy in 2025.

⏲ 7 min read Read →

What I Write About

Focused, technical writing across the key disciplines of modern offensive and defensive security.

🔎

Threat Intelligence

Tracking threat actor TTPs, infrastructure pivots, and intelligence cycle discussions from an analyst's perspective.

🔨

Penetration Testing

Methodology, tooling, and case studies across network, web application, and Active Directory assessments.

🐛

Malware Analysis

Static and dynamic analysis breakdowns — unpacking droppers, loaders, and stealers using open toolchains.

🏗

CTF Write-ups

Detailed solutions for HackTheBox, TryHackMe, and seasonal CTF competitions — with technique explanations.

🔒

OpSec & Privacy

Practical operational security, anonymisation techniques, and no-nonsense privacy guidance beyond the basics.

Blue Team & Detection

SIEM tuning, detection rule writing, incident response notes, and log analysis from a defender's viewpoint.