<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>The Hydra&#39;s Head</title>
    <link>/</link>
    <description>Recent content on The Hydra&#39;s Head</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Mon, 25 Sep 2023 21:00:00 +0200</lastBuildDate>
    <atom:link href="/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Certain Doom - TryHackMe</title>
      <link>/posts/thm-certain-doom/</link>
      <pubDate>Mon, 25 Sep 2023 21:00:00 +0200</pubDate>
      <guid>/posts/thm-certain-doom/</guid>
      <description>Link: https://tryhackme.com/room/certaindoom Difficulty: Hard Creator: Hydragyrum Old Components Lead to Certain Doom! Link to heading Welcome back to a brand new room on TryHackMe. After a bit of a hiatus, I built this room on and off again after seeing a cute exploit during a local CTF at work. The premise is straightforward: The user sees a seemingly innocuous website which has a few secrets hidden behind.&#xA;First Steps: Reconnaissance Link to heading Once we&amp;rsquo;ve booted the machine up and waited a few minutes, we hit the target with a simple nmap scan.</description>
    </item>
    <item>
      <title>Shaker - TryHackMe</title>
      <link>/posts/thm-shaker/</link>
      <pubDate>Fri, 17 Dec 2021 15:00:00 +0100</pubDate>
      <guid>/posts/thm-shaker/</guid>
      <description>A Devious Challenge for a Modern 0-day Link to heading The recent log4j exploit made waves in the Java world when a major exploit using a relatively obscure part of the language was discovered. In this room, we&amp;rsquo;ll exploit this exploit in several different ways and see what&amp;rsquo;s hiding behind this seemingly innocuous website.&#xA;Reconnaissance Link to heading Once we&amp;rsquo;ve booted the machine, let&amp;rsquo;s see what&amp;rsquo;s on there. Using nmap this time, we&amp;rsquo;ll perform the scan in 2 parts.</description>
    </item>
    <item>
      <title>Adam Bertrand&#39;s CV</title>
      <link>/cv/</link>
      <pubDate>Tue, 19 Oct 2021 10:09:54 +0200</pubDate>
      <guid>/cv/</guid>
      <description>Adam Bertrand Software Engineer About Me I am a long-time software developer with over 15 years of experience in developing bespoke solutions for clients in a wide array of industries. Over my career I have used various technology stacks in C/C++, Java, HTML/CSS/JavaScript, and Python among others. I have recently also become very interested in secure development practices and cybersecurity in general. Contact Info hydragyrum @ gmail.com&#xA;Work Experience Pentester 2024-Present Abicom Test software systems for vulnerabilities Provide advice to implementers on how best to secure vulnerable systems Analyze and validate recent vulnerabilities and exploits Information Security Correspondent 2023-2024 Accenture Accompany development teams to aid with security issues Follow up on penetration testing issues Communicate Secure By Design best practices to development teams Relay important security information to the development teams Technical Lead 2019-Present Accenture Continuously seek out best practices and improve the state of the art Provide technical direction for the project.</description>
    </item>
    <item>
      <title>TryHackMe: Raising the Bar For Beginner-Friendly Cybersecurity Training</title>
      <link>/posts/cybersec-with-tryhackme/</link>
      <pubDate>Mon, 05 Jul 2021 22:00:00 +0200</pubDate>
      <guid>/posts/cybersec-with-tryhackme/</guid>
      <description>Making Learning Fun and Easy! Link to heading Do you want to learn about cybersecurity, but are too afraid to jump in? Does learning the basics feel like an overwhelming challenge? Do you just want to learn a little bit more about how computers and the Internet work? If you answered yes to any of these questions, then I have some great news for you!&#xA;TryHackMe, A CyberSecurity training platform has released a brand new &amp;ldquo;Pre-Security&amp;rdquo; Learning Path.</description>
    </item>
    <item>
      <title>From CTF to CVE</title>
      <link>/posts/from-ctf-to-cve/</link>
      <pubDate>Mon, 10 May 2021 23:00:00 +0200</pubDate>
      <guid>/posts/from-ctf-to-cve/</guid>
      <description>An Unexpected Journey Link to heading So this post was originally going to be a writeup of the Year of the Jellyfish Room on TryHackMe (created by the ever devious MuirlandOracle), but it morphed into something much more interesting (The writeup is still on the table though :)).&#xA;In the Beginning Link to heading So the Year of the Jellyfish starts off innocently enough with some basic recon. The twist with this room is that it has a public IP address, but I didn&amp;rsquo;t let that stop me too much.</description>
    </item>
    <item>
      <title>Git and Crumpets - TryHackMe</title>
      <link>/posts/thm-git-and-crumpets/</link>
      <pubDate>Fri, 16 Apr 2021 23:00:00 +0200</pubDate>
      <guid>/posts/thm-git-and-crumpets/</guid>
      <description>Further Adventures in Version Control Link to heading Version control is an extremely useful tool in the coder&amp;rsquo;s arsenal. Git has since emerged as the clear winner of the version control wars (until the next great thing comes around, programmers have the attention span of a ferret ;)). One of the cool things about git is it&amp;rsquo;s distributed nature, yet as we all know, actually sharing a repository with others is a pain.</description>
    </item>
    <item>
      <title>Overpass 3 - TryHackMe</title>
      <link>/posts/thm-overpass3/</link>
      <pubDate>Mon, 25 Jan 2021 22:50:00 +0100</pubDate>
      <guid>/posts/thm-overpass3/</guid>
      <description>Link: https://tryhackme.com/room/overpass3hosting Difficulty: Medium Creator: NinjaJc01 Overpassed? The Story so Far&amp;hellip; Link to heading While the original Overpass room (Writeup here) dealt with Password Managers, they were unfortunately hacked in Overpass 2 (Which is an excellent blue-team walkthrough). Since then the password manager went bust and the company has switched to web hosting in Overpass 3 Surely nothing can go wrong!&#xA;Looking Around Link to heading So as always, we start by looking at what&amp;rsquo;s on our target.</description>
    </item>
    <item>
      <title>The Great Escape - TryHackMe</title>
      <link>/posts/thm-the-great-escape/</link>
      <pubDate>Thu, 07 Jan 2021 09:00:00 +0100</pubDate>
      <guid>/posts/thm-the-great-escape/</guid>
      <description>Docker, Networks, and Container Escapes; Oh My! Link to heading In my second room, I wanted to explore the concept of a Docker Escape. Docker is an extremely useful tool which allows us to isolate applications from each other and the host OS without having to resort to virtual machines. Properly configured it can be very secure, though misconfigurations can introduce massive security holes, which we shall soon see.</description>
    </item>
    <item>
      <title>Git Happens - TryHackMe</title>
      <link>/posts/thm-git-happens/</link>
      <pubDate>Fri, 24 Jul 2020 22:00:00 +0200</pubDate>
      <guid>/posts/thm-git-happens/</guid>
      <description>Link: https://tryhackme.com/room/githappens Difficulty: Easy Creator: Hydragyrum Adventures in Version Control Link to heading Version control is awesome, it really is! Especially Git. But sometimes, site admins or devs make stupid mistakes, and one of these mistakes is failing to cleanup after one&amp;rsquo;s self when deploying.&#xA;In this simple room, the goal is to figure out which username and password combination will unlock the rest of the site. So let&amp;rsquo;s get cracking.</description>
    </item>
    <item>
      <title>Overpass - TryHackMe</title>
      <link>/posts/thm-overpass/</link>
      <pubDate>Sun, 19 Jul 2020 21:45:00 +0200</pubDate>
      <guid>/posts/thm-overpass/</guid>
      <description>Link: https://tryhackme.com/room/overpass Difficulty: Easy Creator: NinjaJc01 5 Bros and a Password Manager Link to heading So password managers are all the rage these days, how hard can it actually be to create one? This beginner-level Capture the Flag room on the excellent TryHackMe site can show us. Overpass is the fruit of the labours of 5 broke college students trying to capitalize on the password manager craze. What can possibly go wrong?</description>
    </item>
    <item>
      <title>Mindgames - TryHackMe</title>
      <link>/posts/thm-mindgames/</link>
      <pubDate>Sat, 13 Jun 2020 22:11:29 +0200</pubDate>
      <guid>/posts/thm-mindgames/</guid>
      <description>Link: https://tryhackme.com/room/mindgames Difficulty: Medium Creator: NinjaJc01 The Madness Returns Link to heading Descent into madness with this expert-level Capture the Flag game from TryHackMe. Mindgames is a new (at the time of writing) free room, pushing your skills, and your mind to the breaking point. There are no guides here, so it&amp;rsquo;s up to you to research and root the machine to find both flags. I highly recommended to try the Wonderland room before this one.</description>
    </item>
    <item>
      <title>Wonderland - TryHackMe</title>
      <link>/posts/thm-wonderland/</link>
      <pubDate>Mon, 08 Jun 2020 22:08:00 +0200</pubDate>
      <guid>/posts/thm-wonderland/</guid>
      <description>Link: https://tryhackme.com/room/wonderland Difficulty: Medium Creator: NinjaJc01 Adventures Down the Rabbit Hole Link to heading Follow the white rabbit and dive into this intermediate-level Capture the Flag game from TryHackMe. Wonderland is a new (at the time of writing) free room, testing your privilege escalation mettle using various techniques. There are no guides here, so it&amp;rsquo;s up to you to research and root the machine to find both flags. As usual, all flags and passwords have been removed to preserve the suspense.</description>
    </item>
    <item>
      <title>Simple CTF - TryHackMe</title>
      <link>/posts/thm-simple-ctf/</link>
      <pubDate>Fri, 05 Jun 2020 09:40:23 +0200</pubDate>
      <guid>/posts/thm-simple-ctf/</guid>
      <description>Link: https://tryhackme.com/room/easyctf Difficulty: Medium Creator: MrSeth6797 A Simple Capture the Flag From TryHackMe Link to heading Simple CTF Is an easy-level boot-to-root (b2r) machine hosted by the excellent TryHackMe site. This challenge has us exploiting a poorly configured CMS to gain access to the host machine. The task questions guide us through the path to exploit the machine and provide some hints as to where to look. Flags and passwords have been removed to keep the suspense :)</description>
    </item>
    <item>
      <title>About Me</title>
      <link>/about/</link>
      <pubDate>Fri, 05 Jun 2020 00:10:02 +0200</pubDate>
      <guid>/about/</guid>
      <description>This is my blog. There are many like it, but this one&amp;rsquo;s mine</description>
    </item>
    <item>
      <title>First!</title>
      <link>/posts/first-post/</link>
      <pubDate>Fri, 05 Jun 2020 00:09:54 +0200</pubDate>
      <guid>/posts/first-post/</guid>
      <description>Hello, World!</description>
    </item>
  </channel>
</rss>
