$ htb writeup initmitre mapping addedlessons learned saved
Hack The Box / GitHub / Medium
HTB Offensive Security Portfolio
Documenting offensive cybersecurity learning through structured writeups with attack flow diagrams, tools used, MITRE ATT&CK mapping, exploitation steps, observations, findings, lessons learned, SEO keywords, and conclusions.
View HTB page
$ hping3 --syn target$ tshark -r wlan.pcaplabeled csv created
VirtualBox / Wireshark / TShark / Python
SYN Flood Detection and Dataset Engineering Lab
Built a VirtualBox internal network with Windows, Linux, and Raspbian VMs, configured Raspbian as a router/NAT gateway, generated SYN flood traffic with Nmap and hping3, captured traffic, and extracted packet features including IP ID, TTL, TCP flags, IPs, ports, sequence/ack numbers, TCP length, window size, and MSS values for labeled CSV datasets.
$ ghidra wannacryfunctions labeledbehavior documented
Ghidra / Malware Analysis
WannaCry Malware Reverse Engineering
Used Ghidra for static analysis and studied ransomware behavior, functions, and execution logic.
$ ssh pi@labvnc enableddns configured
Raspberry Pi / Networking
Raspberry Pi Network Monitoring Setup
Installed Pi OS, configured SSH, VNC, Ethernet provisioning, Wi-Fi profiles, and DNS settings for network and security experimentation.
$ python arm64_emulator.pyregisters initializedcbz/cbnz evaluated
Python / ARM64 concepts
ARM64 Emulator in Python
Built a simplified ARM64 emulator without emulator libraries, implementing registers, processor state handling, instruction parsing, and CBZ/CBNZ execution logic.
$ parse assembly.asminstruction decodedflow mapped
Parser / Assembly / Execution Flow
ARM64 Assembly Parser
Parsed ARM64 assembly instructions manually and built instruction decoding and execution-flow logic for low-level program understanding.