<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://dwgth4i.github.io/</id><title>dwgth4i's blog</title><subtitle>blog, dwgth4i, windows, offensive security, active directory</subtitle> <updated>2026-02-08T04:55:24+00:00</updated> <author> <name>dwgth4i</name> <uri>https://dwgth4i.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://dwgth4i.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://dwgth4i.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 dwgth4i </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>I found a LPE bug on my own machine</title><link href="https://dwgth4i.github.io/posts/lpe_1/" rel="alternate" type="text/html" title="I found a LPE bug on my own machine" /><published>2025-12-06T00:00:00+00:00</published> <updated>2025-12-06T00:00:00+00:00</updated> <id>https://dwgth4i.github.io/posts/lpe_1/</id> <content type="text/html" src="https://dwgth4i.github.io/posts/lpe_1/" /> <author> <name>dwgth4i</name> </author> <category term="research" /> <summary>Last month, I tried to find local privilege escalation bug on my Windows machine and it is quite funny, my daily device I use for every task with cyber security is so damn vulnerable to all kind of bugs but today I will only write about the first and most critical one I found which is Terabox. Terabox is a storage solution and it is cloud-based Enumeration My flow of finding LPE is quite simp...</summary> </entry> <entry><title>File-based Initial Access - MSI</title><link href="https://dwgth4i.github.io/posts/initaccess_msi/" rel="alternate" type="text/html" title="File-based Initial Access - MSI" /><published>2025-11-05T00:00:00+00:00</published> <updated>2025-11-08T06:28:41+00:00</updated> <id>https://dwgth4i.github.io/posts/initaccess_msi/</id> <content type="text/html" src="https://dwgth4i.github.io/posts/initaccess_msi/" /> <author> <name>dwgth4i</name> </author> <category term="knowledge" /> <summary>I played with some kind of file-based Initial Access recently and really enjoy it when I realize there are so many type of file extensions that we can abused it as our weapons. However, I personally spend more time with .msi among them and this blog will be about it, why it is so reliable (imo). This blog will assumed that you are already familiar with some basic features of an Microsoft signed...</summary> </entry> <entry><title>Thoughts on CAPE</title><link href="https://dwgth4i.github.io/posts/cape_thoughts/" rel="alternate" type="text/html" title="Thoughts on CAPE" /><published>2025-10-03T00:00:00+00:00</published> <updated>2025-10-06T15:05:25+00:00</updated> <id>https://dwgth4i.github.io/posts/cape_thoughts/</id> <content type="text/html" src="https://dwgth4i.github.io/posts/cape_thoughts/" /> <author> <name>dwgth4i</name> </author> <category term="misc" /> <summary>Opening Cuối cùng cũng nhặt được cái “áo choàng” hehe, cho anh em nào thắc mắc về độ khó thì nếu như làm nhiều (rất nhiều) lab/box AD thì thật ra đề thi cũng không quá đáng sợ như mình nghĩ, tuy nhiên thì flag đầu vẫn tốn một ngày rưỡi :v 5 flag đầu sẽ khó hơn nhiều so với 5 flag sau, đấy là cảm nhận riêng của mình, còn phía dưới thì anh em mình nói về kĩ thuật một tí nhé. CERTIFIED ACTIVE DI...</summary> </entry> <entry><title>Vulnlab - Shibuya</title><link href="https://dwgth4i.github.io/posts/vl_shibuya/" rel="alternate" type="text/html" title="Vulnlab - Shibuya" /><published>2025-02-28T00:00:00+00:00</published> <updated>2025-02-28T12:06:20+00:00</updated> <id>https://dwgth4i.github.io/posts/vl_shibuya/</id> <content type="text/html" src="https://dwgth4i.github.io/posts/vl_shibuya/" /> <author> <name>dwgth4i</name> </author> <category term="CTF" /> <summary>Enumeration Given the IP address and the ports of the machine: 22/tcp open ssh 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 464/tcp open kpasswd5 593/tcp open http-rpc-epmap 3268/tcp open globalcatLDAP 3269/tcp open globalcatLDAPssl 3389/tcp open ms-wbt-server We should notice that there is the SSH servi...</summary> </entry> <entry><title>HTB Season 7 Week 2 - Backfire</title><link href="https://dwgth4i.github.io/posts/htb_season_7_2/" rel="alternate" type="text/html" title="HTB Season 7 Week 2 - Backfire" /><published>2025-01-20T00:00:00+00:00</published> <updated>2025-01-20T00:00:00+00:00</updated> <id>https://dwgth4i.github.io/posts/htb_season_7_2/</id> <content type="text/html" src="https://dwgth4i.github.io/posts/htb_season_7_2/" /> <author> <name>dwgth4i</name> </author> <category term="CTF" /> <summary>Mở đầu Phải nói là season mới này khởi đầu khá hay, box tuần trước cảm giác hơi dễ quá nhưng mà ít ra HTB bỏ được lối mòn Web vuln hoặc Pre-Auth RCE CVE, … nói chung là cải thiện hơn rất nhiều, và đương nhiên mình sẽ chỉ viết lại write-up cho các box mà mình cảm thấy là thật sự hay (thật ra từ tháng trước đến giờ mình làm gần chục lab vulnlab mà lười viết :v) và có thử để học hỏi. Tuần này box ...</summary> </entry> </feed>
