<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RootedN00b Blog]]></title><description><![CDATA[👋 RootedN00b

Welcome to my corner of the internet — where curiosity meets persistence, and where every “noob” becomes a skilled offensive/Defensive security professional.

My name is RootedN00b, and like many in the infosec world, my journey started with pure curiosity — touching everything without direction until I found my true passion: offensive security.

With a strong background in Networking and Windows Server Administration, I began exploring cybersecurity from the ground up. The web was once my nightmare, but challenges became lessons, and lessons became growth. Along the way, I earned certifications like:

🧠 eJPTv2 (Junior Penetration Tester)

🛠 PNPT (Practical Network Penetration Tester)

🧩 CRTA, CRTP, and CRTO — specializing in Active Directory and Red Team operations.

I’ve also completed several TryHackMe paths — from Junior Penetration Tester to Active Directory Attack & Enumeration, and I constantly challenge myself on platforms like Hack The Box and PortSwigger Academy.

🎯 My Mission

This blog exists for one simple reason:

To share knowledge, inspire learning, and help others become offensive security professionals — one lab, one writeup, one challenge at a time.

Whether you’re a beginner building your foundation or an advanced learner sharpening your red team skills, you’ll find practical roadmaps, learning guides, and deep-dive articles designed to help you level up in cybersecurity.

🧭 What You’ll Find Here

Step-by-step guides for building your offensive security lab.

Red Team workflow breakdowns — from recon to domain domination.

TryHackMe & Hack The Box writeups with clear attack chains.

Hands-on learning paths for networking, AD attacks, and web exploitation.

Resources and mindsets to stay consistent, disciplined, and sharp.

💡 My Philosophy

A good hacker doesn’t guess — they understand how things really work.
Mastering the fundamentals is the foundation of everything you’ll achieve in cybersecurity.

Here, I aim to break down complex topics into clear, actionable knowledge — so that anyone willing to learn can rise from “noob” to pro.

🧰 Connect & Collaborate

If you’re passionate about ethical hacking, red teaming, or just starting your offensive security journey, this space is for you.

Stay tuned for guides, labs, and insights to help you become an Offensive Sec Pro.

]]></description><link>https://blog.rootedn00b.tech</link><image><url>https://cdn.hashnode.com/uploads/logos/68c0dfbd87ef198da3039525/a0ced4ff-0299-4395-bd62-2ec0dc16fcd5.png</url><title>RootedN00b Blog</title><link>https://blog.rootedn00b.tech</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 01 May 2026 08:39:31 GMT</lastBuildDate><atom:link href="https://blog.rootedn00b.tech/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[I Built a Free PDF Compressor for the Terminal — And You Can Use It Today]]></title><description><![CDATA[If you've ever tried to email a PDF only to get bounced back with a "file too large" error, you know the frustration. Online PDF compressors exist, but most of them upload your files to someone else's]]></description><link>https://blog.rootedn00b.tech/i-built-a-free-pdf-compressor-for-the-terminal-and-you-can-use-it-today</link><guid isPermaLink="true">https://blog.rootedn00b.tech/i-built-a-free-pdf-compressor-for-the-terminal-and-you-can-use-it-today</guid><category><![CDATA[pdf -resize]]></category><category><![CDATA[pdf editor]]></category><category><![CDATA[pdf]]></category><dc:creator><![CDATA[rootedn00b]]></dc:creator><pubDate>Sun, 08 Mar 2026 03:25:36 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68c0dfbd87ef198da3039525/890b0bd2-db1c-46e9-898d-6e5b5a76e55d.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you've ever tried to email a PDF only to get bounced back with a "file too large" error, you know the frustration. Online PDF compressors exist, but most of them upload your files to someone else's server, slap a watermark on the result, or lock the good compression behind a paywall.</p>
<p>So I built a small Bash script that does the job locally, in your terminal, using Ghostscript — free, open-source, and already installed on most Linux systems.</p>
<p>Here's everything you need to know about it, how it works, and how to use it.</p>
<h2>The Problem With Online PDF Compressors</h2>
<p>Before getting into the script, it's worth talking about why a local tool is worth having.</p>
<p>Most web-based PDF tools work by uploading your file to a remote server, processing it there, and giving you a download link. That's fine for a recipe you found online. It's not so fine for a contract, a medical document, a tax return, or anything with sensitive information in it. You're trusting a third party with your file, usually with no clear privacy policy, and often with no idea how long they keep it.</p>
<p>Beyond privacy, there's the watermark problem. A lot of free online compressors add a watermark to your output unless you pay. And there's the quality problem — many of them use aggressive compression that blurs images or makes text look muddy.</p>
<p>A local tool avoids all of that. Your file never leaves your machine. No watermarks. No subscription. No upload limits.</p>
<hr />
<h2>Enter Ghostscript</h2>
<p>Ghostscript is a decades-old open-source interpreter for PostScript and PDF. It's not glamorous, but it is the gold standard for PDF manipulation on Linux. It's what powers a lot of the professional PDF tooling you've probably used without knowing it.</p>
<p>The core compression command looks like this:</p>
<p>bash</p>
<pre><code class="language-bash">gs -sDEVICE=pdfwrite -dCompatibilityLevel=1.4 -dPDFSETTINGS=/ebook \
   -dNOPAUSE -dQUIET -dBATCH \
   -sOutputFile=output.pdf input.pdf
</code></pre>
<p>That single command can take a 25 MB PDF down to 4 or 5 MB with no visible quality loss for most documents. The <code>-dPDFSETTINGS</code> flag is the key lever — it controls the trade-off between file size and quality.</p>
<p>There are four presets:</p>
<table>
<thead>
<tr>
<th>Setting</th>
<th>DPI</th>
<th>Best for</th>
</tr>
</thead>
<tbody><tr>
<td><code>/screen</code></td>
<td>72</td>
<td>Email, quick sharing</td>
</tr>
<tr>
<td><code>/ebook</code></td>
<td>150</td>
<td>General use — the sweet spot</td>
</tr>
<tr>
<td><code>/printer</code></td>
<td>300</td>
<td>Documents you'll actually print</td>
</tr>
<tr>
<td><code>/prepress</code></td>
<td>300+</td>
<td>Professional publishing workflows</td>
</tr>
</tbody></table>
<p>For most people, <code>/ebook</code> is the right choice. It cuts file size dramatically while keeping images sharp enough for reading on any screen.</p>
<hr />
<h2>What the Script Does</h2>
<p>Typing that <code>gs</code> command from memory every time is annoying. You have to remember the flags, the output path, the input path. So I wrapped it in a friendly Bash script that walks you through the whole process interactively.</p>
<p>Here's what happens when you run it:</p>
<h3>Step 1 — Ghostscript Check</h3>
<p>The script first checks whether Ghostscript is installed on your system. If it is, it shows you the version and moves on. If it isn't, it asks whether you want to install it.</p>
<pre><code class="language-plaintext">  ⚠  Ghostscript is not installed on this system.

  Would you like to install Ghostscript now? [y/N]
</code></pre>
<p>If you say yes, it detects your package manager automatically — <code>apt</code> on Debian and Ubuntu, <code>dnf</code> on Fedora, <code>pacman</code> on Arch, <code>brew</code> on macOS — and runs the right install command. No manual intervention needed.</p>
<h3>Step 2 — Input File Selection</h3>
<p>Next it asks for the PDF you want to compress. If you're running a desktop environment with GNOME or KDE, it opens a graphical file picker. If you're on a headless server or in a plain terminal, it falls back to a simple text prompt where you type the path.</p>
<p>Both <code>~</code> expansion and absolute paths work fine.</p>
<h3>Step 3 — Quality Selection</h3>
<pre><code class="language-plaintext">  1) Screen   — Smallest file · 72 DPI  · Best for email &amp; web
  2) eBook    — Balanced     · 150 DPI · Good for most uses (recommended)
  3) Printer  — High quality · 300 DPI · Suitable for printing
  4) Prepress — Max quality  · 300 DPI · Professional publishing
</code></pre>
<p>You pick a number. Press Enter without picking anything and it defaults to eBook — the most useful preset for everyday use.</p>
<h3>Step 4 — Output Path</h3>
<p>The script suggests a sensible default output name: if your input is <code>report.pdf</code>, the default output will be <code>report_compressed.pdf</code> in the same folder. You can override this with any path you like.</p>
<p>If the output directory doesn't exist, the script offers to create it. If a file already exists at the output path, it asks before overwriting. No silent data loss.</p>
<h3>The Result</h3>
<p>After Ghostscript runs, you get a clean summary:</p>
<pre><code class="language-plaintext">  ────────────────────────────────────────
  ✔  Done in 3s!
  ────────────────────────────────────────

  Original size :  24.80 MB
  Compressed    :  4.32 MB
  Saved         :  20.48 MB (82.6% smaller)
  Output file   :  /home/user/report_compressed.pdf
</code></pre>
<p>If the output turns out larger than the input (which can happen with already-optimized PDFs), the script warns you and suggests trying a lower quality setting.</p>
<hr />
<h2>How to Get It</h2>
<p>The script is a single file. Download it, make it executable, and run it.</p>
<p>bash</p>
<pre><code class="language-bash"># Download
curl -O https://github.com/RootedN00b/Projects/blob/main/N00bPDF/n00bpdf.sh

# Make executable
chmod +x n00bpdf.sh

# Run
./n00bpdf.sh
</code></pre>
<p>Or if you'd rather copy-paste the contents directly, the full source is included below.</p>
<p>To make it available system-wide so you can call it from anywhere:</p>
<p>bash</p>
<pre><code class="language-bash">sudo mv n00bpdf.sh /usr/local/bin/n00bpd
sudo chmod +x /usr/local/bin/n00bpdf

# Then from anywhere:
n00bpdf
</code></pre>
<hr />
<h2>Real-World Results</h2>
<p>I ran the script against a handful of different PDF types to give you a realistic picture of what to expect.</p>
<table>
<thead>
<tr>
<th>Document type</th>
<th>Original</th>
<th>Compressed (eBook)</th>
<th>Reduction</th>
</tr>
</thead>
<tbody><tr>
<td>Scanned invoice (image-heavy)</td>
<td>24.8 MB</td>
<td>4.3 MB</td>
<td>82%</td>
</tr>
<tr>
<td>Technical report with charts</td>
<td>8.2 MB</td>
<td>1.9 MB</td>
<td>77%</td>
</tr>
<tr>
<td>Text-only legal document</td>
<td>1.1 MB</td>
<td>0.4 MB</td>
<td>64%</td>
</tr>
<tr>
<td>Already-optimized PDF</td>
<td>0.9 MB</td>
<td>1.0 MB</td>
<td>−11%</td>
</tr>
</tbody></table>
<p>The last row is worth noting. If a PDF has already been compressed — by a modern export tool for example — Ghostscript may actually make it slightly larger because it re-encodes everything from scratch. The script detects this and warns you.</p>
<hr />
<h2>What It Won't Do</h2>
<p>A few honest limitations:</p>
<p><strong>It won't compress encrypted PDFs.</strong> If a PDF has a password, Ghostscript can't process it. You'll need to remove the password first using a tool like <code>qpdf --decrypt</code>.</p>
<p><strong>It won't help if your PDF is already optimized.</strong> Some PDFs exported from tools like LaTeX or modern versions of Acrobat are already well-compressed. There's not much left to squeeze out.</p>
<p><strong>It won't preserve all interactive features.</strong> If your PDF has form fields, embedded JavaScript, or complex annotations, some of these may not survive the recompression. For archival or interactive PDFs, test the output carefully before distributing it.  </p>
<p>enjoy resizing your PDF!!!</p>
]]></content:encoded></item><item><title><![CDATA[Network Traffic Analysis]]></title><description><![CDATA[Core Skills for IT Technicians, Network Engineers, Defenders & Pentesters

Introduction
Every system tells a story.Not in logs.Not in dashboards.But on the wire.
Every login, every file transfer, every scan, every misconfiguration — legitimate or mal...]]></description><link>https://blog.rootedn00b.tech/network-traffic-analysis</link><guid isPermaLink="true">https://blog.rootedn00b.tech/network-traffic-analysis</guid><category><![CDATA[infosec]]></category><category><![CDATA[#SecurityAnalyst]]></category><category><![CDATA[#hackthebox #htb #pentest #pentester #pentesting #cybersecurity #cybersec #offensivesecurity #offsec #redteam #redteamer #redteaming #hack #hacker #hacking #ethicalhacking #ethicalhacker #informationsecurity #infosec]]></category><dc:creator><![CDATA[rootedn00b]]></dc:creator><pubDate>Tue, 27 Jan 2026 03:29:07 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1769484420789/c585cda2-a98b-4a72-a6f0-80f6d8eeae4d.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-core-skills-for-it-technicians-network-engineers-defenders-amp-pentesters">Core Skills for IT Technicians, Network Engineers, Defenders &amp; Pentesters</h3>
<hr />
<h2 id="heading-introduction">Introduction</h2>
<p>Every system tells a story.<br />Not in logs.<br />Not in dashboards.<br />But on the wire.</p>
<p>Every login, every file transfer, every scan, every misconfiguration — legitimate or malicious — becomes <strong>network traffic</strong>. Most people never look at it. The few who do gain something powerful: <strong>clarity</strong>.</p>
<p>Network traffic analysis is one of those rare skills that quietly separates average professionals from dangerous ones. It is the common ground where <strong>IT technicians troubleshoot outages</strong>, <strong>network engineers validate designs</strong>, <strong>defenders detect intrusions</strong>, and <strong>pentesters map attack paths</strong>. Different missions — same packets.</p>
<p>Attackers don’t guess. Defenders don’t rely on luck.<br />They observe, capture, filter, and understand what is really happening between systems.</p>
<p>If you’ve ever wondered:</p>
<ul>
<li><p>How attackers move without being noticed</p>
</li>
<li><p>Why defenders miss obvious intrusions</p>
</li>
<li><p>Why “everything looks fine” while the network is compromised</p>
</li>
<li><p>Or why good engineers naturally become strong security analysts</p>
</li>
</ul>
<p>The answer is almost always the same: <strong>network visibility</strong>.</p>
<p>This article breaks down the <strong>core network traffic analysis skills</strong>, the <strong>tools and methodologies used across roles</strong>, and—most importantly—<strong>how attackers and defenders look at the same traffic in completely different ways</strong>.</p>
<p>Because once you can read the wire,<br /><strong>the network can’t lie to you anymore</strong>.</p>
<hr />
<h2 id="heading-why-network-traffic-analysis-matters">Why Network Traffic Analysis Matters</h2>
<p>Network traffic analysis (NTA) allows professionals to:</p>
<ul>
<li><p>Understand how systems <em>really</em> communicate</p>
</li>
<li><p>Detect misconfigurations and design flaws</p>
</li>
<li><p>Identify malicious behavior and attack paths</p>
</li>
<li><p>Validate security controls and detections</p>
</li>
<li><p>Reconstruct incidents and attack timelines</p>
</li>
</ul>
<p>Whether you are fixing an outage or breaking into a domain, <strong>everything starts with traffic</strong>.</p>
<blockquote>
<p>If you don’t understand network traffic, you are blind — no matter your role.</p>
</blockquote>
<hr />
<h2 id="heading-core-network-traffic-analysis-skills">Core Network Traffic Analysis Skills</h2>
<h3 id="heading-1-strong-networking-fundamentals-non-negotiable">1. Strong Networking Fundamentals (Non-Negotiable)</h3>
<p>Before tools, before alerts, before exploits — you must understand <strong>how traffic flows</strong>.</p>
<p>Core concepts include:</p>
<ul>
<li><p>OSI &amp; TCP/IP models</p>
</li>
<li><p>TCP vs UDP behavior</p>
</li>
<li><p>DNS resolution process</p>
</li>
<li><p>ARP, ICMP, DHCP</p>
</li>
<li><p>Routing vs switching</p>
</li>
<li><p>VLANs &amp; segmentation</p>
</li>
<li><p>NAT &amp; firewall logic</p>
</li>
<li><p>TLS/SSL basics</p>
</li>
</ul>
<p>Without this foundation, packet analysis becomes random clicking instead of analysis.</p>
<hr />
<h3 id="heading-2-packet-level-thinking">2. Packet-Level Thinking</h3>
<p>A skilled analyst can answer:</p>
<ul>
<li><p>Who initiated the connection?</p>
</li>
<li><p>On which port and protocol?</p>
</li>
<li><p>Was the traffic encrypted?</p>
</li>
<li><p>Did the handshake succeed?</p>
</li>
<li><p>What failed — and why?</p>
</li>
</ul>
<p>This applies equally to:</p>
<ul>
<li><p>A printer not responding</p>
</li>
<li><p>Malware beaconing outbound</p>
</li>
<li><p>A reverse shell failing to connect</p>
</li>
<li><p>An authentication error in Active Directory</p>
</li>
</ul>
<p>Packets explain everything.</p>
<hr />
<h3 id="heading-3-traffic-pattern-recognition">3. Traffic Pattern Recognition</h3>
<p>Over time, professionals learn to recognize:</p>
<ul>
<li><p>Normal vs abnormal traffic</p>
</li>
<li><p>Human vs automated behavior</p>
</li>
<li><p>Beaconing patterns</p>
</li>
<li><p>Scanning activity</p>
</li>
<li><p>Lateral movement indicators</p>
</li>
</ul>
<p>This skill is built through <strong>repetition and exposure</strong>, not theory alone.</p>
<hr />
<h2 id="heading-tools-used-for-network-traffic-analysis">Tools Used for Network Traffic Analysis</h2>
<h3 id="heading-core-tools-all-roles">Core Tools (All Roles)</h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Tool</td><td>Purpose</td></tr>
</thead>
<tbody>
<tr>
<td>Wireshark</td><td>Deep packet inspection</td></tr>
<tr>
<td>tcpdump / tshark</td><td>Command-line packet capture</td></tr>
<tr>
<td>netstat / ss</td><td>Connection visibility</td></tr>
<tr>
<td>nmap</td><td>Traffic generation &amp; scanning</td></tr>
<tr>
<td>Firewall logs</td><td>Traffic allow/deny decisions</td></tr>
<tr>
<td>SPAN / TAP</td><td>Traffic mirroring</td></tr>
</tbody>
</table>
</div><hr />
<h3 id="heading-defender-amp-soc-tools">Defender &amp; SOC Tools</h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Tool</td><td>Purpose</td></tr>
</thead>
<tbody>
<tr>
<td>Zeek (Bro)</td><td>Protocol-level traffic analysis</td></tr>
<tr>
<td>Suricata / Snort</td><td>IDS / IPS detection</td></tr>
<tr>
<td>SIEM</td><td>Log and traffic correlation</td></tr>
<tr>
<td>NetFlow / IPFIX</td><td>Traffic metadata</td></tr>
<tr>
<td>EDR network telemetry</td><td>Endpoint network visibility</td></tr>
</tbody>
</table>
</div><hr />
<h3 id="heading-attacker-pentester-tools">Attacker / Pentester Tools</h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Tool</td><td>Purpose</td></tr>
</thead>
<tbody>
<tr>
<td>Wireshark / tcpdump</td><td>Payload &amp; protocol analysis</td></tr>
<tr>
<td>Responder</td><td>LLMNR / NBNS poisoning</td></tr>
<tr>
<td>Impacket</td><td>SMB / Kerberos interaction</td></tr>
<tr>
<td>C2 frameworks</td><td>Beacon &amp; channel analysis</td></tr>
<tr>
<td>Proxychains / Burp</td><td>Traffic interception</td></tr>
</tbody>
</table>
</div><p>Attackers and defenders often use <strong>the same tools</strong> — only the intent differs.</p>
<hr />
<h2 id="heading-network-traffic-analysis-methodology">Network Traffic Analysis Methodology</h2>
<p>This methodology applies to <strong>both offense and defense</strong>.</p>
<h3 id="heading-1-visibility">1. Visibility</h3>
<p>What traffic can I see? From where?</p>
<h3 id="heading-2-baseline">2. Baseline</h3>
<p>What does normal look like?</p>
<h3 id="heading-3-filtering">3. Filtering</h3>
<p>Reduce noise by protocol, IP, port, or time.</p>
<h3 id="heading-4-correlation">4. Correlation</h3>
<p>Network data alone is never enough.</p>
<h3 id="heading-5-interpretation">5. Interpretation</h3>
<p>Why does this traffic exist?</p>
<h3 id="heading-6-action">6. Action</h3>
<p>Block, alert, fix, exploit, pivot.</p>
<hr />
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1769484082108/06b3a3a3-adfb-4453-8653-17626bf34b14.png" alt class="image--center mx-auto" /></p>
<h2 id="heading-how-attackers-see-network-traffic">How Attackers See Network Traffic</h2>
<p>Attackers see traffic as <strong>opportunity</strong>.</p>
<p>They look for:</p>
<ul>
<li><p>Clear-text credentials</p>
</li>
<li><p>Weak or legacy protocols</p>
</li>
<li><p>Misconfigured services</p>
</li>
<li><p>Trust relationships</p>
</li>
<li><p>Internal visibility after compromise</p>
</li>
</ul>
<h3 id="heading-attacker-mindset">Attacker Mindset</h3>
<blockquote>
<p>“What can this traffic reveal about the environment?”</p>
</blockquote>
<p>Examples:</p>
<ul>
<li><p>DNS leaks internal domain structure</p>
</li>
<li><p>SMB traffic exposes Active Directory design</p>
</li>
<li><p>Kerberos errors reveal privilege boundaries</p>
</li>
<li><p>ICMP maps reachable networks</p>
</li>
<li><p>Firewall rules expose segmentation flaws</p>
</li>
</ul>
<p>Traffic guides stealth, persistence, and lateral movement.</p>
<hr />
<h2 id="heading-how-defenders-see-network-traffic">How Defenders See Network Traffic</h2>
<p>Defenders see traffic as <strong>evidence</strong>.</p>
<p>They look for:</p>
<ul>
<li><p>Deviations from baseline</p>
</li>
<li><p>Unauthorized protocols</p>
</li>
<li><p>Suspicious destinations</p>
</li>
<li><p>Beaconing behavior</p>
</li>
<li><p>East-west movement</p>
</li>
</ul>
<h3 id="heading-defender-mindset">Defender Mindset</h3>
<blockquote>
<p>“What does not belong here?”</p>
</blockquote>
<p>Examples:</p>
<ul>
<li><p>Workstations talking SMB to each other</p>
</li>
<li><p>DNS tunneling patterns</p>
</li>
<li><p>Long-lived outbound connections</p>
</li>
<li><p>Rare or suspicious user agents</p>
</li>
<li><p>Authentication outside business hours</p>
</li>
</ul>
<p>Traffic tells the truth — if you know how to read it.</p>
<hr />
<h2 id="heading-it-technicians-amp-network-engineers-perspective">IT Technicians &amp; Network Engineers Perspective</h2>
<p>For IT and network engineers, traffic analysis is about <strong>reliability and stability</strong>.</p>
<p>They analyze:</p>
<ul>
<li><p>Packet loss</p>
</li>
<li><p>Latency and jitter</p>
</li>
<li><p>MTU mismatches</p>
</li>
<li><p>Routing issues</p>
</li>
<li><p>Firewall misconfigurations</p>
</li>
</ul>
<p>Many security incidents are discovered <strong>during troubleshooting</strong>, not hunting.</p>
<p>Strong engineers naturally become strong defenders.</p>
<hr />
<h2 id="heading-common-mistakes">Common Mistakes</h2>
<ul>
<li><p>Jumping to tools without understanding protocols</p>
</li>
<li><p>Ignoring encrypted traffic metadata</p>
</li>
<li><p>Analyzing packets without context</p>
</li>
<li><p>Failing to establish a baseline</p>
</li>
<li><p>Treating NTA as “security-only”</p>
</li>
</ul>
<hr />
<h2 id="heading-how-to-build-this-skill-practically">How to Build This Skill Practically</h2>
<ul>
<li><p>Analyze traffic in your <strong>own lab</strong></p>
</li>
<li><p>Capture normal and broken scenarios</p>
</li>
<li><p>Observe:</p>
<ul>
<li><p>AD logins</p>
</li>
<li><p>File transfers</p>
</li>
<li><p>VPN connections</p>
</li>
<li><p>Malware simulations</p>
</li>
</ul>
</li>
<li><p>Compare normal vs attack traffic</p>
</li>
<li><p>Write short analysis reports</p>
</li>
</ul>
<hr />
<h2 id="heading-final-thought">Final Thought</h2>
<p>Network traffic analysis is not role-specific.<br />It is a <strong>core technical skill</strong>.</p>
<ul>
<li><p>IT technicians use it to <strong>fix</strong></p>
</li>
<li><p>Network engineers use it to <strong>design</strong></p>
</li>
<li><p>Defenders use it to <strong>detect</strong></p>
</li>
<li><p>Pentesters use it to <strong>exploit</strong></p>
</li>
</ul>
<p>The packets never lie.<br />Only your interpretation can.</p>
]]></content:encoded></item><item><title><![CDATA[VoIP  on Zyxel switch]]></title><description><![CDATA[🧩 How to Configure VoIP on a Zyxel Switch with Grandstream Phones Using a Voice VLAN
In today’s networks, Voice over IP (VoIP) has become a core communication service for both businesses and labs. To ensure call quality and reduce network interferen...]]></description><link>https://blog.rootedn00b.tech/voip-on-zyxel-switch</link><guid isPermaLink="true">https://blog.rootedn00b.tech/voip-on-zyxel-switch</guid><category><![CDATA[voip]]></category><category><![CDATA[networking]]></category><category><![CDATA[System administration]]></category><category><![CDATA[ccna]]></category><dc:creator><![CDATA[rootedn00b]]></dc:creator><pubDate>Wed, 22 Oct 2025 02:46:58 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1761101072453/bbb60c50-d201-435d-918a-a2abb572f6f4.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1 id="heading-how-to-configure-voip-on-a-zyxel-switch-with-grandstream-phones-using-a-voice-vlan">🧩 How to Configure VoIP on a Zyxel Switch with Grandstream Phones Using a Voice VLAN</h1>
<p>In today’s networks, <strong>Voice over IP (VoIP)</strong> has become a core communication service for both businesses and labs. To ensure call quality and reduce network interference, the best practice is to <strong>separate voice and data traffic</strong> using a <strong>Voice VLAN (Virtual Local Area Network)</strong>.</p>
<p>In this guide, we’ll walk through the process of configuring VoIP using a <strong>Zyxel switch</strong> and <strong>Grandstream IP phones</strong>, focusing on proper VLAN segmentation and network efficiency.</p>
<hr />
<h2 id="heading-understanding-the-concept">🧠 Understanding the Concept</h2>
<p>Before jumping into configuration, let’s review what we’re achieving:</p>
<ul>
<li><p><strong>Voice VLAN</strong>: A dedicated VLAN for all VoIP traffic. This separation ensures better QoS (Quality of Service) and easier troubleshooting.</p>
</li>
<li><p><strong>Data VLAN</strong>: The regular network for computers, printers, and other non-voice devices.</p>
</li>
<li><p><strong>Auto Voice VLAN</strong>: A Zyxel feature that automatically detects and assigns IP phones to the voice VLAN based on the device’s OUI (Organizationally Unique Identifier).</p>
</li>
</ul>
<p>This setup ensures:</p>
<ul>
<li><p>Low latency for voice traffic</p>
</li>
<li><p>Isolated network for security</p>
</li>
<li><p>Automatic phone provisioning with DHCP and VLAN tagging</p>
</li>
</ul>
<hr />
<h2 id="heading-prerequisites">🧰 Prerequisites</h2>
<p>You’ll need the following:</p>
<ul>
<li><p>A <strong>Zyxel managed switch</strong> (e.g., GS1900 / XGS1930 / GS2220 series)</p>
</li>
<li><p><strong>Grandstream IP Phones</strong> (e.g., GXP or GRP models)</p>
</li>
<li><p><strong>DHCP server</strong> (can be on your router, firewall, or server)</p>
</li>
<li><p><strong>Configured VLANs</strong> (Data and Voice)</p>
</li>
<li><p><strong>Internet access or PBX/VoIP server</strong> (e.g., FreePBX, 3CX, or Grandstream UCM) - Optional for lab demo</p>
</li>
</ul>
<hr />
<h2 id="heading-step-by-step-configuration-guide">⚙️ Step-by-Step Configuration Guide</h2>
<h3 id="heading-1-define-vlans-on-the-zyxel-switch"><strong>1. Define VLANs on the Zyxel Switch</strong></h3>
<ol>
<li><p>Log in to the Zyxel switch web interface.</p>
<p> <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1761095491515/2934779e-67b1-4333-b8b8-4a57c317b45d.png" alt class="image--center mx-auto" /></p>
</li>
<li><p>Go to <strong>Switching → VLAN → VLAN Setup,</strong> click on the <strong>Add/Edit</strong> to add your vlan, make sure you have the <strong>Tx Tagging</strong> checked.</p>
<p> Scroll down to apply the setup.</p>
<p> <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1761095805830/b0971fe1-dea2-4051-99e2-4747295811f0.png" alt class="image--center mx-auto" /></p>
</li>
<li><p>You should have the following VLANs:</p>
<ul>
<li><p>VLAN 1 – <strong>Data VLAN</strong></p>
</li>
<li><p>VLAN 100 – <strong>Voice VLAN</strong></p>
<p>  <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1761095963172/734950c0-402d-4f5a-bea9-6800f9d4efae.png" alt class="image--center mx-auto" /></p>
</li>
</ul>
</li>
<li><p>Set <strong>port membership</strong>:</p>
<ul>
<li><p>Trunk ports (uplinks to router/Firewall or VoIP server) → Tagged for both VLANs</p>
</li>
<li><p>Access ports (for PCs) → Untagged in VLAN 1 (Uncheck <strong>Tx Tagging</strong> to untagged port)</p>
</li>
<li><p>Phone ports → Tagged in VLAN 100, like they are in the above picture.</p>
</li>
</ul>
</li>
</ol>
<hr />
<h3 id="heading-2-enable-the-voice-vlan-feature"><strong>2. Enable the Voice VLAN Feature</strong></h3>
<ol>
<li><p>Navigate to <strong>Switching → VLAN → Voice VLAN Setup.</strong></p>
</li>
<li><p>Enable <strong>Voice VLAN</strong>.</p>
</li>
<li><p>Set <strong>VLAN ID = 100</strong> (In my case). Then apply the configuration</p>
</li>
</ol>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1761096343368/23846eeb-a0d1-4736-a4d6-eafac6be48f5.png" alt class="image--center mx-auto" /></p>
<ol>
<li><p>Enable <strong>OUI Detection</strong> in <strong>Voice VLAN OUI Setup</strong> and add Grandstream’s OUI prefixes, e.g.:</p>
<ul>
<li><p><code>000B82</code></p>
</li>
<li><p><code>000B83</code></p>
</li>
<li><p><code>000B84</code></p>
</li>
</ul>
</li>
</ol>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1761096557872/bc1aab4f-7ac0-437d-a569-1d104f2ccec8.png" alt class="image--center mx-auto" /></p>
<p>At this point your phone is ready to be detected on the network and get assigned an IP via the OUI, but not ready to communicate.</p>
<p>Test ping from the router / Firewall will be failed because the Frame doesn’t have any VLAN ID to get.</p>
<hr />
<h3 id="heading-3-configure-port-settings-for-phones"><strong>3. Configure Port Settings for Phones</strong></h3>
<ol>
<li><p>Go to <strong>Port → LLDP → LLDP-MED</strong>.</p>
</li>
<li><p>click on the <strong>LLDP-MED Network Policy</strong> to add the ports where your phones are connected, click on <strong>Add/Edit</strong></p>
</li>
<li><p>Assign the ports connected to phones as <strong>Voice VLAN ports</strong>.</p>
</li>
<li><p>Add the <strong>Voice VLAN for Auto Assignment</strong> on that port.</p>
</li>
<li><p>If your phones is daisy-chained (PC connected to the phone’s PC port):</p>
<ul>
<li><p>Configure the service as voice.</p>
</li>
<li><p>Set the Tag to Tagged</p>
</li>
<li><p><strong>DSCP</strong> (Differentiated Service Code Point) useful for better quality of service</p>
</li>
<li><p>Set the <strong>QoS (802.1q priority)</strong> to <strong>6</strong> or <strong>7</strong> for high priority voice traffic. (higher priority better performance)</p>
</li>
<li><p>Apply the configuration.</p>
</li>
</ul>
</li>
</ol>
<p>    <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1761097414554/03f57d85-67af-41ec-ad15-46047d5ac55c.png" alt class="image--center mx-auto" /></p>
<p>    Click on the <strong>LLDP-MED Setup</strong> in the same page check the <strong>Network Policy</strong> option for all of the port where you have connected phones</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1761098453039/7575022e-3c7a-4865-b6b8-f2d7ed5f233e.png" alt class="image--center mx-auto" /></p>
<p>If the policy checkbox is uncheck the frame of from the phone won’t get tagged with the VLAN ID 100</p>
<p>Wireshark ARP frame before <strong>Network Policy</strong> checked</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1761099401751/4a789d2f-1309-4f20-82e6-e564c9072b31.png" alt class="image--center mx-auto" /></p>
<p>Wireshark ARP frame after enabling <strong>Network Policy</strong> checked</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1761099712962/e51a961e-1b08-4404-bb76-949a5d9ff6b1.png" alt class="image--center mx-auto" /></p>
<hr />
<h3 id="heading-4-dhcp-options-for-voice-vlan"><strong>4. DHCP Options for Voice VLAN</strong></h3>
<p>Ensure your DHCP server has a <strong>scope for the Voice VLAN (VLAN 100)</strong>.</p>
<ul>
<li><p>Assign a different <strong>subnet</strong> (e.g., 192.168.100.0/24).</p>
</li>
<li><p>Add <strong>Option 66 or 160</strong> if using <strong>auto-provisioning</strong> for Grandstream phones (e.g., pointing to your PBX or provisioning server).</p>
</li>
</ul>
<hr />
<h3 id="heading-5-configure-grandstream-phone-vlan-settings"><strong>5. Configure GrandStream Phone VLAN Settings</strong></h3>
<p>By default, GrandStream phones can receive VLAN info via <strong>LLDP-MED</strong> or <strong>DHCP Option 132</strong>.</p>
<p>If you need to configure manually:</p>
<ol>
<li><p>Access the phone web GUI.</p>
</li>
<li><p>Navigate to <strong>Network → Basic Settings → Ethernet</strong>.</p>
</li>
<li><p>Set <strong>Layer 2 QoS 802.1p Priority</strong> to <code>6</code> and <strong>VLAN Tag</strong> to <code>100</code>.</p>
</li>
<li><p>Save and reboot the phone.</p>
</li>
</ol>
<p>Once rebooted, the phone should receive its IP address from the <strong>Voice VLAN</strong> DHCP scope and register with the PBX or your Provisioning server .</p>
<p><mark>NB: What is </mark> <strong><mark>LLDP</mark></strong> <mark> ?</mark><br /><strong>LLDP</strong> (Link Layer Discovery Protocol) is an <strong>open standard Layer 2 protocol (IEEE 802.1AB)</strong> used by network devices (switches, routers, wireless access points, IP phones, etc.) to <strong>advertise and discover information</strong> about each other directly connected on the same local network segment.</p>
<p>There is an other protocol that can achieve the same thing thing named <strong>CDP</strong> which is a Cisco proprietory not all vendor use it.</p>
<hr />
<h2 id="heading-testing-amp-verification">📞 Testing &amp; Verification</h2>
<ul>
<li><p>Verify the phone’s IP address — it should be in the <strong>Voice VLAN</strong> subnet, and must recieve ping packet from the router / firewall</p>
</li>
<li><p>Ping between your PBX and the phone.</p>
</li>
<li><p>Make a test call and check call quality.</p>
</li>
<li><p>On the Zyxel switch, you can verify with:</p>
<ul>
<li><p><strong>Monitoring → VLAN Port Status</strong></p>
</li>
<li><p><strong>LLDP Neighbor Table</strong> (to confirm detection of Grandstream phones)</p>
</li>
</ul>
</li>
</ul>
<hr />
<h2 id="heading-troubleshooting-tips">🧩 Troubleshooting Tips</h2>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Issue</td><td>Possible Cause</td><td>Solution</td></tr>
</thead>
<tbody>
<tr>
<td>Phone can’t gets IP from Data VLAN</td><td>Voice VLAN OUI not detected</td><td>Manually set VLAN ID or check LLDP</td></tr>
<tr>
<td>No IP assigned</td><td>DHCP not available on VLAN 100</td><td>Verify DHCP scope for Voice VLAN</td></tr>
<tr>
<td>Call quality poor</td><td>QoS not configured</td><td>Set priority 6 or 7 in switch QoS settings</td></tr>
</tbody>
</table>
</div><hr />
<h2 id="heading-best-practices">💡 Best Practices</h2>
<ul>
<li><p>Keep <strong>Voice VLAN isolated</strong> from Data VLAN for better performance.</p>
</li>
<li><p>Use <strong>LLDP-MED</strong> for automatic VLAN assignment.</p>
</li>
<li><p>Monitor <strong>switch port utilization</strong> for any packet drops.</p>
</li>
<li><p>Always <strong>update switch and phone firmware</strong> to latest stable versions.</p>
</li>
</ul>
<hr />
<h2 id="heading-conclusion">🧱 Conclusion</h2>
<p>Implementing a <strong>Voice VLAN on a Zyxel switch</strong> with <strong>Grandstream IP phones</strong> is a simple yet powerful way to optimize your VoIP network. With proper VLAN segmentation, QoS prioritization, and device auto-detection, your voice calls will be clear, stable, and secure — exactly what a professional communication system should deliver.</p>
]]></content:encoded></item><item><title><![CDATA[Why Every Hacker Needs to Understand Kerberos Attacks]]></title><description><![CDATA[A Quick Thank You
Before diving in, a huge thanks to the offensive security community — from the creators of tools and labs to everyone sharing knowledge daily. Without this spirit of collaboration, many of us wouldn’t have learned how deep and fasci...]]></description><link>https://blog.rootedn00b.tech/why-every-hacker-needs-to-understand-kerberos-attacks</link><guid isPermaLink="true">https://blog.rootedn00b.tech/why-every-hacker-needs-to-understand-kerberos-attacks</guid><category><![CDATA[Kerberos]]></category><category><![CDATA[redteaming]]></category><category><![CDATA[pentesting]]></category><dc:creator><![CDATA[rootedn00b]]></dc:creator><pubDate>Wed, 08 Oct 2025 01:15:27 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1759886045350/c7665177-f7e2-41f2-92d4-f505dee4f1fc.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3 id="heading-a-quick-thank-you">A Quick Thank You</h3>
<p>Before diving in, a huge thanks to the offensive security community — from the creators of tools and labs to everyone sharing knowledge daily. Without this spirit of collaboration, many of us wouldn’t have learned how deep and fascinating Active Directory attacks really are.</p>
<h3 id="heading-the-hidden-gatekeeper-inside-every-network">The Hidden Gatekeeper Inside Every Network</h3>
<p>If you’ve ever compromised a Windows environment, you’ve probably crossed paths with <strong>Kerberos</strong> — even if you didn’t notice it. It’s the <em>invisible bouncer</em> controlling who gets in, who stays out, and who can access which part of the building.</p>
<p>Kerberos is not just another protocol. It’s the <em>heart of authentication</em> in modern Windows Active Directory environments — the same environments that power corporations, schools, and governments.</p>
<p>And that’s exactly why <strong>understanding Kerberos attacks is non-negotiable</strong> for anyone serious about hacking, red teaming, or defending enterprise networks.</p>
<h3 id="heading-what-is-kerberos-really">What Is Kerberos, Really?</h3>
<p>At its core, Kerberos is an authentication protocol that uses <strong>tickets</strong> instead of passwords to verify identities.</p>
<p>Think of it like this:</p>
<ul>
<li><p>When you log in, Kerberos gives you a <strong>ticket</strong> proving who you are.</p>
</li>
<li><p>That ticket lets you access services (like file shares or databases) without typing your password again.</p>
</li>
<li><p>Everything runs smoothly — until an attacker learns how to <strong>forge</strong>, <strong>steal</strong>, or <strong>manipulate</strong> those tickets.</p>
</li>
</ul>
<p>Once you master that concept, you’re not just playing with exploits anymore — you’re <strong>speaking the language of enterprise security</strong>.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1759885906252/8a7a1c25-6143-47ee-a864-02297429b306.jpeg" alt class="image--center mx-auto" /></p>
<h3 id="heading-why-hackers-love-kerberos">Why Hackers Love Kerberos</h3>
<p>Kerberos attacks are so powerful because they target the <strong>core trust mechanism</strong> of Windows networks. Once compromised, attackers can move laterally, escalate privileges, and even impersonate domain administrators.</p>
<p>Here’s what makes it so interesting:</p>
<ul>
<li><p><strong>Stealth:</strong> Most Kerberos-based attacks don’t trigger antivirus or EDR alerts.</p>
</li>
<li><p><strong>Privilege Escalation:</strong> Once you own a ticket, you own access — sometimes domain-wide.</p>
</li>
<li><p><strong>Persistence:</strong> Forged tickets can last hours or even days, giving long-term control.</p>
</li>
</ul>
<h3 id="heading-the-most-common-kerberos-attacks-and-why-they-matter">The Most Common Kerberos Attacks (and Why They Matter)</h3>
<p>Here’s a breakdown of the attacks every hacker and red teamer should understand — from the simplest to the most advanced.</p>
<h4 id="heading-1-kerbrute-amp-user-enumeration">1. <strong>Kerbrute &amp; User Enumeration</strong></h4>
<p>A recon-level attack where the attacker brute-forces usernames against Kerberos to discover valid accounts. It’s fast, silent, and forms the basis for targeted attacks later.</p>
<h4 id="heading-2-as-rep-roasting">2. <strong>AS-REP Roasting</strong></h4>
<p>When users don’t require pre-authentication, attackers can request encrypted data and crack it offline to recover passwords. A simple misconfiguration — a big door wide open.</p>
<h4 id="heading-3-kerberoasting">3. <strong>Kerberoasting</strong></h4>
<p>One of the classics. Attackers request service tickets (TGS) for service accounts, extract them, and crack them offline to reveal plaintext passwords — often with domain-level privileges.</p>
<h4 id="heading-4-pass-the-ticket-ptt">4. <strong>Pass-the-Ticket (PtT)</strong></h4>
<p>Instead of stealing passwords, attackers steal <em>tickets</em> directly from memory (like <code>mimikatz sekurlsa::tickets</code>). They then reuse them to impersonate legitimate users.</p>
<h4 id="heading-5-golden-ticket">5. <strong>Golden Ticket</strong></h4>
<p>The ultimate weapon. By compromising the <strong>KRBTGT</strong> account (the key to the entire kingdom), attackers can forge any ticket — even for accounts that don’t exist. Complete domain dominance.</p>
<h4 id="heading-6-silver-ticket">6. <strong>Silver Ticket</strong></h4>
<p>A quieter alternative — forged for a single service instead of the entire domain. It’s harder to detect and perfect for maintaining access under the radar.</p>
<h3 id="heading-why-beginners-should-learn-this-early">Why Beginners Should Learn This Early</h3>
<p>If you’re just starting your offensive security journey, Kerberos might sound intimidating — but learning it early changes everything.</p>
<p>Understanding <strong>Kerberos attacks</strong> helps you:</p>
<ul>
<li><p>Grasp how Windows authentication truly works.</p>
</li>
<li><p>Understand lateral movement and privilege escalation.</p>
</li>
<li><p>Transition smoothly into <strong>Active Directory Red Teaming</strong>.</p>
</li>
<li><p>Build a stronger foundation for advanced certs like <strong>CRTP, CRTO, or PNPT</strong>.</p>
</li>
</ul>
<p>Even if you only play in labs like <strong>TryHackMe</strong>, <strong>HackTheBox</strong>, or <strong>PortSwigger Academy</strong>, you’ll notice Kerberos scenarios everywhere. That’s because it’s one of the <strong>most realistic attack surfaces</strong> you can simulate.</p>
<h3 id="heading-for-the-pros-the-red-team-advantage">For the Pros: The Red Team Advantage</h3>
<p>For professional red teamers, Kerberos attacks are more than just tricks — they’re tools of strategy.</p>
<p>Advanced operators chain Kerberos abuse with:</p>
<ul>
<li><p><strong>BloodHound</strong> for relationship mapping</p>
</li>
<li><p><strong>Impacket</strong> for remote execution (<code>GetUserSPNs.py</code>, <code>psexec.py</code>)</p>
</li>
<li><p><strong>Cobalt Strike / Sliver</strong> for ticket impersonation</p>
</li>
<li><p><strong>PowerView / Rubeus</strong> for in-memory attacks</p>
</li>
</ul>
<p>And defenders who understand these attacks can implement better mitigations — from enforcing pre-authentication to monitoring unusual ticket requests in <strong>SIEM</strong>.</p>
<h3 id="heading-how-to-practice-safely">How to Practice Safely</h3>
<p>You don’t need a corporate network to get started.<br />You can build a <strong>mini Active Directory lab</strong> in Proxmox, Hyper-V, or even VirtualBox and reproduce these attacks step by step.</p>
<p>Try platforms like:</p>
<ul>
<li><p><a target="_blank" href="https://tryhackme.com/room/attacktivedirectory">TryHackMe – Attacktive Directory</a></p>
<p>  <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1759885581422/285e8344-d826-4138-90ac-030e85f4f9af.png" alt class="image--center mx-auto" /></p>
</li>
<li><p><a target="_blank" href="https://app.hackthebox.com/machines/212">HackTheBox – Forest / Active Directory Labs</a></p>
<p>  <img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1759885558832/ac760e0d-46ce-4522-9165-562bb9f71dea.png" alt class="image--center mx-auto" /></p>
</li>
</ul>
<p>These resources let you practice real attacks without crossing ethical boundaries.</p>
<h3 id="heading-defenders-dont-scroll-past">Defenders, Don’t Scroll Past!</h3>
<p>If you’re blue teaming, Kerberos knowledge is equally crucial.<br />Knowing how attackers manipulate tickets helps you detect and respond faster.</p>
<p>Here’s how:</p>
<ul>
<li><p>Enable <strong>Kerberos pre-authentication</strong> for all users.</p>
</li>
<li><p>Rotate <strong>service account passwords</strong> regularly.</p>
</li>
<li><p>Monitor <strong>Event IDs 4768–4771</strong> for anomalies.</p>
</li>
<li><p>Implement <strong>tiered administration</strong> and <strong>LSA protection</strong>.</p>
</li>
</ul>
<h3 id="heading-final-thoughts">Final Thoughts</h3>
<p>Kerberos isn’t just an authentication protocol — it’s a battlefield.<br />Whether you’re a beginner trying your first lab or a red teamer executing lateral movement in a mature network, understanding Kerberos gives you <strong>x-ray vision into how trust and access really work</strong> inside Windows environments.</p>
<p>So don’t just learn the tools — learn the system.<br />Because the hacker who truly understands Kerberos…<br /><strong>owns the network before even launching an exploit.</strong></p>
<p><strong>Further Reading &amp; Practice</strong></p>
<ul>
<li><p><a target="_blank" href="https://tryhackme.com/room/breachingad">TryHackMe: Breaching Active Directory</a></p>
</li>
<li><p><a target="_blank" href="https://academy.hackthebox.com/module/details/143">HackTheBox Academy: AD Enumeration &amp; Attacks</a></p>
</li>
<li><p><a target="_blank" href="https://attack.mitre.org/techniques/T1558/">MITRE ATT&amp;CK: T1558 Kerberos Attacks</a></p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Exegol: The Ultimate Red Team Environment You Should Know About]]></title><description><![CDATA[Imagine popping open a fresh, fully-configured pentest environment in seconds — with every tool you need, zero dependency hell, and the confidence that your host stays clean. That’s the promise Exegol delivers: not another clunky distro to install an...]]></description><link>https://blog.rootedn00b.tech/exegol-the-ultimate-red-team-environment-you-should-know-about</link><guid isPermaLink="true">https://blog.rootedn00b.tech/exegol-the-ultimate-red-team-environment-you-should-know-about</guid><category><![CDATA[hacking]]></category><category><![CDATA[pentesting]]></category><category><![CDATA[redteaming]]></category><category><![CDATA[blueteam]]></category><dc:creator><![CDATA[rootedn00b]]></dc:creator><pubDate>Wed, 08 Oct 2025 00:38:20 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1759883339042/0beccd7e-e794-4683-8ca1-a7fe58247ee5.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Imagine popping open a fresh, fully-configured pentest environment in seconds — with every tool you need, zero dependency hell, and the confidence that your host stays clean. That’s the promise Exegol delivers: not another clunky distro to install and maintain, but a modern, container-first <em>hacking environment</em> built for real-world red teams, CTFers, and security pros.</p>
<h3 id="heading-special-thanks"><strong>Special Thanks</strong></h3>
<p>Before diving in, I want to extend my deepest gratitude to the <strong>Exegol Team</strong> and the entire <a target="_blank" href="https://exegol.com/community"><strong>community of contributors</strong></a> behind this incredible project. Your hard work, innovation, and dedication have truly changed the way red teamers, pentesters, and cybersecurity learners build and use their offensive security environments.</p>
<p>Exegol isn’t just a tool — it’s a movement that empowers thousands of professionals and enthusiasts to learn, test, and operate more efficiently and securely.<br />Thank you for continuously pushing the boundaries of what’s possible in the red team ecosystem.</p>
<h2 id="heading-what-is-exegol">What is Exegol ?</h2>
<p>Exegol isn’t a traditional OS you install on your laptop. It’s a modular, Docker-based environment powered by a small Python “wrapper” that manages images and containers for you. Each Exegol image is a self-contained toolkit — run one per engagement and never worry about breaking your main system or fighting library conflicts. It’s like carrying a toolbox of perfect workbenches that you can spin up or tear down at will.</p>
<h2 id="heading-why-red-blue-teams-and-pros-are-buzzing-about-it">Why red / blue teams and pros are buzzing about it</h2>
<ul>
<li><p><strong>Containerized reliability:</strong> Tools run inside isolated Docker images, so “it worked yesterday” actually means something. You get reproducible environments across machines and OSes.</p>
</li>
<li><p><strong>Modular &amp; community-driven:</strong> Exegol images are built, tested, and published as separate artifacts — pick the image that suits your workflow (full, minimal, nightly, ARM, amd64). The community actively contributes and curates toolsets.</p>
</li>
<li><p><strong>Works where you are:</strong> While Linux is recommended for best performance, Exegol runs on Windows/macOS via Docker Desktop too — perfect for teams with mixed laptops. <a target="_blank" href="https://docs.exegol.com">Exegol Documentation</a></p>
</li>
<li><p><strong>Offline resources &amp; convenience:</strong> Common scripts, netshells, and privesc helpers are bundled as “resources” available inside each container so you don’t repeatedly fetch the same tools.</p>
</li>
</ul>
<h2 id="heading-exegol-vs-a-classic-distro-kali-parrot-etc">Exegol vs. a classic distro (Kali, Parrot, etc.)</h2>
<p>Kali and similar distros are great, but they’re monolithic: one host OS with many tools. Exegol flips the model — instead of making your host the toolbox, each container is the toolbox. That means:</p>
<ul>
<li><p>No more dependency Hell on your host.</p>
</li>
<li><p>Cleaner audit trails and less risk of leaving residual artifacts.</p>
</li>
<li><p>Easier experimentations: try a risky tool inside a disposable container rather than messing with your main install. Several write-ups compare Exegol favorably for professionals who need reproducibility and sandboxing.</p>
</li>
</ul>
<h2 id="heading-real-world-use-cases">Real-world use cases</h2>
<ul>
<li><p><strong>Red Team engagements:</strong> Maintain separate containers per target to keep tools, logs, and configs isolated.</p>
</li>
<li><p><strong>CTFs &amp; training:</strong> Quickly spin up an environment tailored for a challenge without hours of setup.</p>
</li>
<li><p><strong>Tool testing &amp; research:</strong> Safely test new/potentially hazardous utilities in an ephemeral container.</p>
</li>
<li><p><strong>Teaching &amp; labs:</strong> Provide students a consistent environment so every learner sees the same results (handy for instructors — and yes, it fits nicely into a learning roadmap for offensive security).</p>
</li>
</ul>
<h2 id="heading-getting-started-fast">Getting started (fast)</h2>
<ol>
<li><p>Install Docker, Python3, pipx, and git.</p>
</li>
<li><p>Install the Exegol wrapper (the “brains”): <code>pipx install exegol</code> (or follow the official docs).</p>
</li>
<li><p>Pull an image and start a container: the wrapper handles the heavy lifting so you get a ready-to-hack shell with GUI support if you need Burp/BloodHound. The docs are straightforward and recommend Linux for the smoothest experience.</p>
</li>
</ol>
<h2 id="heading-things-to-keep-in-mind-security-amp-ethics">Things to keep in mind (security &amp; ethics)</h2>
<p>Exegol makes it easy to run offensive tooling — that power comes with responsibility. Always:</p>
<ul>
<li><p>Have explicit authorization before testing systems.</p>
</li>
<li><p>Keep your containers and images up to date; Exegol provides nightly and stable builds but you should follow your team’s update policy.</p>
</li>
<li><p>Understand that container isolation is strong but not absolute — configure Docker and host networking safely for sensitive engagements.</p>
</li>
</ul>
<h2 id="heading-final-verdict-why-you-should-care">Final verdict — why you should care</h2>
<p>If you’re a practitioner who values speed, reproducibility, and clean environments, Exegol is a game-changer. It’s the modern answer to long-standing pentest pains: dependency nightmares, messy hosts, and unreproducible setups. For learners and seasoned red-teamers alike, Exegol lets you spend less time configuring and more time actually hacking — a practical boost for anyone serious about offensive security.</p>
<p>Want to explore further? Check the project repo and the official docs for installation guides, images, and best practices — then try spinning up a container for your next lab. If you’re following a roadmap to become an offensive security pro, Exegol slots neatly into the “power of terminal + tooling” stage of your learning journey.</p>
<p><a target="_blank" href="https://github.com/ThePorgs">Github repo</a></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1759883322884/7a98076f-87a0-4dd0-89ac-952cc59fb3e7.png" alt class="image--center mx-auto" /></p>
<p>I use <a target="_blank" href="https://exegol.com">Exegol</a> and YOU</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1759883741131/235dd7f0-47e7-4515-9746-3ef02f93f6a6.png" alt class="image--center mx-auto" /></p>
]]></content:encoded></item><item><title><![CDATA[Nested Virtualization (Proxmox - Hyper-v)]]></title><description><![CDATA[🚀 Introduction
Virtualization has completely transformed the way we build, manage, and experiment with IT environments. From running multiple operating systems on a single machine to powering entire enterprise infrastructures, it has become a corner...]]></description><link>https://blog.rootedn00b.tech/nested-virtualization-proxmox-hyper-v</link><guid isPermaLink="true">https://blog.rootedn00b.tech/nested-virtualization-proxmox-hyper-v</guid><category><![CDATA[Homelab]]></category><category><![CDATA[windows server]]></category><category><![CDATA[virtual machine]]></category><category><![CDATA[virtualization]]></category><category><![CDATA[System administration]]></category><dc:creator><![CDATA[rootedn00b]]></dc:creator><pubDate>Fri, 19 Sep 2025 22:33:33 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1758321204054/acc1311a-f8ed-4156-bae0-1f102c1692c7.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-introduction">🚀 Introduction</h2>
<p>Virtualization has completely transformed the way we build, manage, and experiment with IT environments. From running multiple operating systems on a single machine to powering entire enterprise infrastructures, it has become a cornerstone of modern computing.</p>
<p>But what if you could take it one step further? Imagine running a hypervisor <strong>inside</strong> a virtual machine — essentially creating a virtual lab within another virtual lab. That’s exactly what <strong>nested virtualization</strong> is.</p>
<p>Nested virtualization opens the door to building complex environments without needing racks of servers or expensive hardware. Whether you’re a student preparing for certifications, a penetration tester building attack labs, or an engineer testing cloud workloads, nested virtualization provides the flexibility to experiment freely while saving cost and space.</p>
<p>In this article, we’ll break down what nested virtualization is, its benefits, limitations, and how you can set it up in different environments like Proxmox and Hyper-V.</p>
<h2 id="heading-what-is-nested-virtualization">What is Nested Virtualization?</h2>
<p>At its core, <strong>nested virtualization</strong> is the ability to run a virtual machine (VM) inside another VM by enabling hardware virtualization extensions (such as Intel VT-x or AMD-V) to pass through to the guest hypervisor.</p>
<ul>
<li><p><strong>Normal virtualization</strong>: Your physical machine runs a hypervisor (like Proxmox, VMware, or Hyper-V), and on top of that you run VMs.</p>
</li>
<li><p><strong>Nested virtualization</strong>: One of those VMs also runs its own hypervisor, which can then host more VMs inside it.</p>
</li>
</ul>
<p>A simple analogy: it’s like putting a smaller set of Russian dolls inside a bigger one. Each doll (VM) can contain another, all while relying on the outermost physical host for resources.</p>
<h2 id="heading-benefits-of-nested-virtualization">Benefits of Nested Virtualization</h2>
<h3 id="heading-learning-amp-training">🧑‍💻 Learning &amp; Training</h3>
<p>If you’re studying for certifications like <strong>Windows / Linux administration</strong>, <strong>Setting up for penetration testing certification : CRTP, CRTE, CRTO</strong> nested virtualization lets you create realistic practice labs without extra hardware.</p>
<h3 id="heading-cybersecurity-amp-red-teaming">🛡️ Cybersecurity &amp; Red Teaming</h3>
<p>Red teamers and penetration testers can simulate complex enterprise environments (multi-domain forests, pivoting paths, AD labs) all on a single server.</p>
<h3 id="heading-testing-amp-development">🏗️ Testing &amp; Development</h3>
<p>Developers and sysadmins can test new tools, simulate cloud environments, or spin up temporary labs for projects without needing to reconfigure bare-metal servers.</p>
<h3 id="heading-cost-efficiency">💰 Cost Efficiency</h3>
<p>Why buy more servers when you can use one well-provisioned box? Nested virtualization stretches your resources by allowing multiple test environments in parallel.</p>
<hr />
<h2 id="heading-limitations-amp-considerations">Limitations &amp; Considerations</h2>
<p>Nested virtualization is powerful, but it’s not perfect.</p>
<ul>
<li><p><strong>Performance Overhead</strong>: Every extra virtualization layer consumes CPU and RAM, so workloads may feel slower.</p>
</li>
<li><p><strong>Hardware Demands</strong>: You’ll need a CPU that supports Intel VT-x or AMD-V, and enough RAM to handle multiple VM layers.</p>
</li>
<li><p><strong>Compatibility Issues</strong>: Not all hypervisors handle nested virtualization equally. Some require special tweaks (like enabling KVM on Proxmox or exposing virtualization extensions in Hyper-V).</p>
</li>
<li><p><strong>Networking Complexity</strong>: Routing VLANs, NAT, and bridging through multiple virtualization layers can be tricky.</p>
</li>
</ul>
<p>For production workloads, bare-metal virtualization is better. But for labs, nested virtualization is often the most practical option.</p>
<h3 id="heading-nested-virtualization-setup-scenarios">Nested Virtualization Setup Scenarios</h3>
<p>🖥️ Proxmox → Windows Server → Hyper-V → VMs</p>
<p>First install Proxmox on a computer as main operating System, if you don’t know how to install proxmox refer to any youtube video and follow up to get that part done</p>
<p>Once you have your proxmox server ready, let’s dive into the setup</p>
<p>Login to proxmox using the server IP and port : https://server-ip:8006</p>
<h4 id="heading-install-windows-server-2022">Install windows server 2022</h4>
<p>On the proxmox web interface click on <strong>Create VM</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758314328878/b9c76522-1ccb-448f-8274-120c9a8e41f8.png" alt class="image--center mx-auto" /></p>
<p>add a name for your Virtual Machine and click next</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758314473209/85626e18-52ec-4a1d-9503-fcfcf655d6f6.png" alt class="image--center mx-auto" /></p>
<p>In the next tab use the option that fit you to install the ISO in my case I have the ISO file I leave it as default and insert the ISO in the <strong>ISO Image</strong> section then select Microsoft Windows for <strong>Guest OS Type and Version</strong> hit Next</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758314680832/eba7f4cc-e37d-4490-ab13-49691a3be4be.png" alt class="image--center mx-auto" /></p>
<p>Next tab choose the options below</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758314778955/72d2e430-4fdd-4449-b1b0-ad7a6f7955bc.png" alt class="image--center mx-auto" /></p>
<p>NB: change <strong>EFI Storage and TPM Storage</strong> to your location on Proxmox. Then click next</p>
<p>Next tab , give at least 80 GiB for the disk space, chose the Bus as <strong>SATA or VirtIO Block</strong> and check SSD enumlation for better performace, storage is always your storage on proxmox for your VMs, click NEXT</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758314983341/8737bd7d-0569-40f7-a24a-d3e4a23a8859.png" alt class="image--center mx-auto" /></p>
<p>I the bellow tab that’s where the crucial part is happening, for better performance allocate 2 cores to your VM, and select <strong>host</strong> on the <strong>CPU Type</strong> if <strong>Host</strong> is not selected you will get an error message later , that’s gonna stop you to create your VM on Hyper-V. Then hit NEXT</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758315150239/1f2ccbc8-5de0-49b8-8dcc-a87c30f35086.png" alt class="image--center mx-auto" /></p>
<p>Allocate a minimum of 8 GiB, then NEXT</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758315228308/f739513b-a0e1-4064-9b4e-c104d17b8ae7.png" alt class="image--center mx-auto" /></p>
<p>Next tab is where you have to configure your networking information for the VM, on thing to note is that the Model of the NIC must be <strong>E1000 or VirtIO(Paravitualized)</strong>, if you have vlan setup in you network you can put the VLAN-ID in VLAN Tag. Then NEXT</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758315412537/51672141-5e0f-4d0e-a130-314b2d739123.png" alt class="image--center mx-auto" /></p>
<p>and the NEXT tab you just have to click Finish.</p>
<p>Now your VM is ready click on the left side <strong>Folder View —&gt; Virtual Machine</strong> Click on you VM to start it</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758315697923/d61894a2-e966-4ac7-89cc-c442898d2d9a.png" alt class="image--center mx-auto" /></p>
<p>Click on Console to have access to the VM interface</p>
<p>If you have trouble for your ISO to boot go on the <strong>Option</strong> below <strong>Console</strong> select <strong>Boot order</strong> and make sure the ide2 in #1 then click OK</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758315896063/cfce2cf0-2eca-4b22-a868-b7e63d01f4e6.png" alt class="image--center mx-auto" /></p>
<p>Go back to <strong>Console</strong> click <strong>Start Now</strong></p>
<p><em><mark>During the boot start repeat that :</mark></em> <strong><em><mark>mouse (right click + ENTER)</mark></em></strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758316316301/e3b87edc-1c47-44d9-a582-1ba28494c262.png" alt class="image--center mx-auto" /></p>
<p>Follow the steps to install Windows server or refer to that Article : <a target="_blank" href="https://blog.rootedn00b.tech/how-to-install-windows-server-2022?showSharer=true">lnstall Windows server 2022</a></p>
<p>Once you have your Windows installed and ready, now we can proceed with the next step to prepare our Server for Nested Virtualization.</p>
<p>Windows server 2022 has a role called Hyper-V you can also find it in some windows client such as the Pro version</p>
<p>Let’s install Hyper. Go to <strong>Server Manager.</strong> On the top right click on <strong>Manage</strong> —&gt; <strong>Add Roles and Features</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758318666662/50bd928e-3e8e-4dd3-9b2a-5995e18f89d0.png" alt class="image--center mx-auto" /></p>
<p>In the page that open click NEXT</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758318713335/6febcd6b-9dfa-48d1-a964-8cf5e83cab57.png" alt class="image--center mx-auto" /></p>
<p>Click NEXT 2 times until you get the page below, where you will have to select the roles and feature to install, in our case Hyper-V, then click NEXT</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758318841341/828edd6b-10ca-46a0-87c8-e45c24d64cea.png" alt class="image--center mx-auto" /></p>
<p>Leave next page as default click <strong>Add Features</strong> then click <strong>NEXT</strong></p>
<p>Next page leave default unless you need extras parameters click <strong>NEXT</strong> —&gt; <strong>NEXT</strong></p>
<p>choose your network adapter click <strong>NEXT</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758319034365/e65fb533-3575-45dc-bbf9-70eabe4ddd12.png" alt class="image--center mx-auto" /></p>
<p>Next page leave default click <strong>NEXT</strong> —&gt; change VM disk and file location if needed otherwise click <strong>NEXT</strong></p>
<p>Select case to restart server after role installed, click <strong>YES</strong> and click <strong>INSTALL</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758319239254/effd2ddf-4a92-44c1-ab4b-d452185eabd2.png" alt class="image--center mx-auto" /></p>
<p>After server restart go to search bar type : <strong>Hyper-V</strong> and click the Hyper-V Manager feature</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758319486734/7287c7ca-643c-4408-b740-fc4e77457459.png" alt class="image--center mx-auto" /></p>
<p>Now we have Hyper-V on our Server Let’s create a VM</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758319563882/6fdfce41-0d9e-43c6-81b4-33fdcc817dd1.png" alt class="image--center mx-auto" /></p>
<p>To create a VM, right click on the Server name in Hyper-V —&gt; New —&gt; virtual Machine</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758319660088/f6f03563-a3d0-4304-ad48-a3567ba2cfd5.png" alt class="image--center mx-auto" /></p>
<p>In the next page click <strong>NEXT</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758319859041/b2875a17-ab9e-4044-9c6a-08b3e7d491c2.png" alt class="image--center mx-auto" /></p>
<p>Give a <strong>name</strong> to your Virtual Machine —&gt; change default location or leave as default —&gt; click <strong>NEXT</strong></p>
<p>Below chose generation type —&gt; <strong>Generation 2 —&gt; NEXT</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758320010310/758b6e48-fafb-4949-a2de-c6036e4463ad.png" alt class="image--center mx-auto" /></p>
<p>Allocate memory to your VM —&gt; 2GB minimum —&gt; click <strong>NEXT</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758320108552/7cd006dd-d83c-4277-888f-4c4fa8b7ad1f.png" alt class="image--center mx-auto" /></p>
<p>Configure Network, you can choose <strong>Not Connected</strong> and create a virtual switch later to attack your VM to it or just choose your Host VM network adapter just for demo purposes. Click <strong>NEXT</strong></p>
<p>Allocate disk space to your VM and click <strong>NEXT</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758320306949/e48bafe0-1570-4fa9-b8ac-d046c227d6e9.png" alt class="image--center mx-auto" /></p>
<p>choose your installation media, here ISO file</p>
<p>Download ISO file here: <a target="_blank" href="https://go.microsoft.com/fwlink/p/?LinkID=2195280&amp;clcid=0x409&amp;culture=en-us&amp;country=US">Windows server 2022 ISO</a></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758320495812/1728b335-cec1-4459-b820-75ea1529abdd.png" alt class="image--center mx-auto" /></p>
<p>Then click <strong>NEXT</strong> then <strong>FINISH</strong></p>
<p>Now you have your VM created, select the VM and under the VM name on the right side click start or double click the MV name then click start.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758320679134/191101b4-816c-440f-9957-b8e8171d3f45.png" alt class="image--center mx-auto" /></p>
<p><em><mark>Change the boot order Under VM name on the right side click on settings —&gt; Boot firmware, make sure the DVD Drive is on top</mark></em></p>
<p><em><mark>During the boot start repeat that :</mark></em> <strong><em><mark>mouse (right click + ENTER)</mark></em></strong></p>
<p>Follow the steps to install windows server 2022 or read this article: <a target="_blank" href="https://blog.rootedn00b.tech/how-to-install-windows-server-2022">How to install windows server 2022</a></p>
<h2 id="heading-common-use-cases">Common Use Cases</h2>
<p>Nested virtualization is not just a lab toy — it solves real problems:</p>
<ul>
<li><p><strong>Active Directory Labs</strong>: Multi-domain, multi-forest, with trust relationships for pentesting and sysadmin practice.</p>
</li>
<li><p><strong>Red Team / Blue Team Simulations</strong>: Build both attack and defense environments, Practice complex attack and complex implementation, SOC monitoring, and detection.</p>
</li>
<li><p><strong>Cloud Simulations</strong>: Run Kubernetes, Docker, and other cloud-native tools in test labs.</p>
</li>
<li><p><strong>Homelab Networking</strong>: Integrate with physical Networking hardware (like router, switch, firewall) to simulate enterprise-grade VLAN setups.</p>
</li>
</ul>
<h2 id="heading-troubleshooting-amp-best-practices">Troubleshooting &amp; Best Practices</h2>
<ul>
<li><p><strong>Enable Virtualization in BIOS/UEFI</strong>: Ensure Intel VT-x/AMD-V and IOMMU are enabled.</p>
</li>
<li><p><strong>Pass CPU Flags to Nested VMs</strong>: For Proxmox, expose <code>host</code> CPU type; for Hyper-V, enable nested virtualization via PowerShell.</p>
</li>
<li><p><strong>Plan Resources Carefully</strong>: Assign enough RAM and CPU, but avoid starving your host.</p>
</li>
<li><p><strong>Networking Tip</strong>: Use bridged networking and VLAN tagging to keep lab traffic organized.</p>
</li>
<li><p><strong>Snapshots Are Your Friend</strong>: Always snapshot before major lab experiments.</p>
</li>
</ul>
<hr />
<h2 id="heading-conclusion">Conclusion</h2>
<p>Nested virtualization is more than just a cool trick — it’s a powerful tool for anyone serious about learning, testing, or simulating real-world environments. By running hypervisors inside virtual machines, you gain the ability to create highly flexible labs, replicate enterprise networks, and practice complex attack or defense scenarios — all from a single physical server.</p>
<p>Yes, it comes with performance trade-offs and hardware requirements, but the benefits far outweigh the limitations. For learners, it’s a game-changer. For professionals, it’s a cost-effective solution for testing and training.</p>
<p>If you’re serious about advancing in IT, cybersecurity, or systems engineering, consider setting up your own nested virtualization lab. Start small, optimize as you go, and soon you’ll have a powerful environment to practice, experiment, and push your skills further.</p>
]]></content:encoded></item><item><title><![CDATA[How to install Windows Server 2022]]></title><description><![CDATA[Windows Server 2022 is Microsoft server operating system, designed for stability, performance, and modern security. Whether you’re setting it up for a homelab, enterprise environment, or training, understanding how to install and configure it is an e...]]></description><link>https://blog.rootedn00b.tech/how-to-install-windows-server-2022</link><guid isPermaLink="true">https://blog.rootedn00b.tech/how-to-install-windows-server-2022</guid><category><![CDATA[windows server]]></category><category><![CDATA[sysadmin]]></category><category><![CDATA[Homelab]]></category><category><![CDATA[System administration]]></category><dc:creator><![CDATA[rootedn00b]]></dc:creator><pubDate>Fri, 19 Sep 2025 21:43:20 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1758318119126/a023a53e-c422-413b-a07e-3ea17649d905.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Windows Server 2022 is Microsoft server operating system, designed for stability, performance, and modern security. Whether you’re setting it up for a homelab, enterprise environment, or training, understanding how to install and configure it is an essential IT skill.</p>
<p>In this article, we’ll go through the key concepts you need to know before installing Windows Server 2022, and then outline the process. The detailed step-by-step technical guide will be added later.</p>
<h2 id="heading-why-windows-server-2022">Why Windows Server 2022?</h2>
<p>Windows Server 2022 comes with improvements that make it stand out from previous versions:</p>
<ul>
<li><p><strong>Enhanced Security</strong> – Secure-core server, TLS 1.3 by default, and better encryption.</p>
</li>
<li><p><strong>Hybrid Capabilities with Azure</strong> – Integration for cloud-connected environments.</p>
</li>
<li><p><strong>Modern Application Platform</strong> – Support for containers and updated networking.</p>
</li>
<li><p><strong>Improved Performance &amp; Scalability</strong> – Built for both small labs and large data centers.</p>
</li>
</ul>
<h2 id="heading-installation-requirements">Installation Requirements</h2>
<p>Before starting, make sure you meet the system requirements:</p>
<ul>
<li><p><strong>Processor</strong>: 1.4 GHz 64-bit processor or faster</p>
</li>
<li><p><strong>RAM</strong>: Minimum 2 GB (Desktop Experience requires more at least 4GB)</p>
</li>
<li><p><strong>Disk Space</strong>: At least 32 GB (recommend 50 GB+)</p>
</li>
<li><p><strong>Network</strong>: Gigabit Ethernet adapter</p>
</li>
<li><p><strong>Installation Media</strong>: ISO file or bootable USB/DVD</p>
</li>
</ul>
<h2 id="heading-installation-options">Installation Options</h2>
<p>When installing Windows Server 2022, you’ll usually choose between two main editions:</p>
<ol>
<li><p><strong>Standard Edition</strong> – For basic server roles and small to medium environments.</p>
</li>
<li><p><strong>Datacenter Edition</strong> – For larger environments with virtualization and advanced features.</p>
</li>
</ol>
<h2 id="heading-step-by-step-installation-guide">Step-by-Step Installation Guide</h2>
<p>Insert your Media (USB - CD/DVD)</p>
<p>boot your machine (Physique or VM) on the installation media</p>
<p>on the first screen choos your install language, time and keyboard, then click NEXT</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758317197799/aa28366d-6a3d-41e5-bbe2-3ad937518cd1.png" alt class="image--center mx-auto" /></p>
<p>Click <strong>INSTALL NOW</strong></p>
<p>In the below screen that is where you choose which windows server type you wish to install, for now let’s choose <strong>Desktop Evaluation (Desktop Experience)</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758317320681/d4540d99-be02-433a-b7fa-09ee92b76078.png" alt class="image--center mx-auto" /></p>
<p>In the next screen accept the License Terms and click NEXT</p>
<p>Chose <strong>custom</strong> to make sure you choose the right disk</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758317414826/215a923c-b3d4-4851-8bf6-ee2fbb8dceee.png" alt class="image--center mx-auto" /></p>
<p>Select your disk and click NEXT</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758317446166/4f9f5323-8998-4e4f-b739-1e9e9477b54f.png" alt class="image--center mx-auto" /></p>
<p><em><mark>If you are using virtualization software make sure after installation before server boot again you change the Boot priority so you have have your DISK #1</mark></em></p>
<p>After the installation setup your administrator password and your server is ready to launch.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758317903399/fc4b16a2-b3d1-4221-897b-d9e0203400b6.png" alt class="image--center mx-auto" /></p>
<p>To Login press <strong>CTRL + ALT + DELETE</strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1758317995921/ab3ecd7d-53b9-4d3b-9f52-b96e0f72e935.png" alt class="image--center mx-auto" /></p>
<h2 id="heading-post-installation-tasks">Post-Installation Tasks</h2>
<p>After the installation, you’ll want to configure essential settings:</p>
<ul>
<li><p><strong>Rename the Server</strong> – Give it a meaningful name.</p>
</li>
<li><p><strong>Set a Static IP Address</strong> – Ensures consistency in your network.</p>
</li>
<li><p><strong>Join a Domain (if needed)</strong> – Integrate into Active Directory.</p>
</li>
<li><p><strong>Enable Windows Updates</strong> – Keep the server secure.</p>
</li>
<li><p><strong>Install Server Roles &amp; Features</strong> – Depending on your use case (DNS, AD DS, etc.).</p>
</li>
</ul>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>Installing Windows Server 2022 is a foundational skill for any IT professional or homelab builder. Once you get comfortable with the process, you’ll be ready to explore advanced configurations such as domain controllers, Hyper-V virtualization, and Active Directory management.</p>
<hr />
<p>✨ <strong>Pro Tip</strong>: Document your installation steps and configurations. Clear notes and screenshots will help you later when troubleshooting or replicating setups.</p>
]]></content:encoded></item><item><title><![CDATA[How to install Metasploitable2 on docker — step-by-step]]></title><description><![CDATA[Did you ever want to test some technologies or Vulnerable labs at on place without the need to setup a separate virtual machine, that were Docker comes to help you setup those labs just in your attacking VM (kali parrot or exegol) or test VM.
Another...]]></description><link>https://blog.rootedn00b.tech/how-to-install-metasploitable2-on-docker-step-by-step</link><guid isPermaLink="true">https://blog.rootedn00b.tech/how-to-install-metasploitable2-on-docker-step-by-step</guid><category><![CDATA[Vulnerable lab]]></category><category><![CDATA[pentesting]]></category><category><![CDATA[metasploitable]]></category><category><![CDATA[Docker]]></category><category><![CDATA[hacking]]></category><dc:creator><![CDATA[rootedn00b]]></dc:creator><pubDate>Wed, 17 Sep 2025 21:40:35 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1758144477132/def93778-48a6-4598-a658-cac8362ffdac.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Did you ever want to test some technologies or Vulnerable labs at on place without the need to setup a separate virtual machine, that were Docker comes to help you setup those labs just in your attacking VM (kali parrot or exegol) or test VM.</p>
<p>Another point to take into consideration from a pentesting point of view is the fact that you will have to run your vulnerable VM inside of an isolated Docker Network (don’t expose it to the public internet), then use a pentest machine (Kali, for example) to test against it. Below I give the commands, a <code>docker</code> example, security notes, and clear definitions for every term used.</p>
<h2 id="heading-what-is-metasploitable">What is Metasploitable?</h2>
<p><strong>Metasploitable</strong> is an intentionally vulnerable virtual machine/image created for learning and practicing penetration testing. It’s purposely full of old/unpatched services so students can safely practice finding and exploiting vulnerabilities. Use it only in isolated labs.</p>
<h2 id="heading-quick-install-metasploitable2-docker-image">Quick install (Metasploitable2 Docker image)</h2>
<ol>
<li><p><strong>Install Docker</strong> (if you don’t already).</p>
<ul>
<li><p>On Linux: follow the official Docker docs (install <code>docker</code> and optionally <code>docker-compose</code>).</p>
</li>
<li><pre><code class="lang-plaintext">  sudo apt install docker.io
</code></pre>
</li>
</ul>
</li>
<li><p><strong>Pull the image</strong> from Docker Hub (example image that many guides use):</p>
<pre><code class="lang-plaintext"> docker pull tleemcjr/metasploitable2
</code></pre>
<p> (Other community images exist; pick a trusted source or build your own from Metasploitable sources.) <a target="_blank" href="https://hub.docker.com/r/tleemcjr/metasploitable2">Docker Hub - Metasploitable2</a></p>
</li>
<li><p><strong>Run a container in an isolated network</strong> (recommended):</p>
<pre><code class="lang-plaintext"> # create a user network for your lab
 docker network create pentest-lab # pentest-lab refer to the name of your docker NIC
</code></pre>
</li>
</ol>
<p>Run the container and attach the network to it</p>
<pre><code class="lang-plaintext">docker run -it --rm --name metasploitable2 -h metasploitable-hotname --network pentest-lab tleemcjr/metasploitable2
</code></pre>
<ul>
<li><p><strong>Find the container IP</strong> (After command successful you will prompt a shell on the metasploitable machine):</p>
<pre><code class="lang-plaintext">  ifconfig
</code></pre>
</li>
<li><p><strong>Login info</strong> (classic for Metasploitable2): username <code>msfadmin</code>, password <code>msfadmin</code>.</p>
</li>
</ul>
<h2 id="heading-security-and-best-practices-must-read">Security and best practices (must-read)</h2>
<ul>
<li><p><strong>Do not</strong> expose Metasploitable to the public internet (no port publishing with <code>-p</code> unless you know what you’re doing). Run it on an isolated Docker network. <a target="_blank" href="https://www.educative.io/answers/how-to-build-a-cyber-security-lab-with-docker?utm_source=chatgpt.com">Educative</a></p>
</li>
<li><p>Treat Metasploitable as untrusted code — it runs vulnerable services; run in a throwaway VM or on a dedicated lab machine.</p>
</li>
<li><p>Consider snapshots or ephemeral containers: destroy and recreate the container between lessons.</p>
</li>
<li><p>If you need reproducible builds, consider building your own Dockerfile from the Metasploitable3 project or sources rather than using random hub images.</p>
</li>
</ul>
<h2 id="heading-common-variants-images">Common variants / images</h2>
<ul>
<li><p><strong>Metasploitable2</strong> — older, classic vulnerable Linux VM; widely used in training.</p>
</li>
<li><p><strong>Metasploitable3</strong> — newer, built from scratch (Ubuntu/Windows flavors). There are community Docker builds and the official repo to build VMs. If you want an up-to-date vulnerable target you may prefer Metasploitable3</p>
</li>
</ul>
<h2 id="heading-glossary">Glossary</h2>
<ul>
<li><p><strong>Docker</strong><br />  Containerization platform that runs applications (and their dependencies) in lightweight, isolated environments called <em>containers</em>. Think of it like a very small virtual machine that shares the host OS kernel.</p>
</li>
<li><p><strong>Image</strong><br />  A read-only template that contains the file system and configuration for a container. You <code>pull</code> images from registries (e.g., Docker Hub) or build them locally. Example: <code>tleemcjr/metasploitable2</code> is an <em>image</em>.</p>
</li>
<li><p><strong>Container</strong><br />  A running instance of an image. You <code>run</code> an image to create and start a container. Containers have names (e.g., <code>metasploitable</code>) and can be started, stopped, and removed.</p>
</li>
<li><p><strong>Docker Hub</strong><br />  A public registry where people publish Docker images so others can download them. There are official images and community images; trust matters.</p>
</li>
<li><p><code>docker pull</code><br />  Command to download an image from a registry to your host.</p>
</li>
<li><p><code>docker run</code><br />  Command to start a container from an image. Options include <code>-d</code> (detached), <code>-it</code> (interactive + TTY), <code>--name</code> (give it a name), <code>--network</code> (attach to a Docker network), and <code>-p</code> (publish container ports to the host).</p>
</li>
<li><p><strong>Port mapping (</strong><code>-p</code>)<br />  Exposes container ports to the host machine (e.g., <code>-p 8080:80</code> exposes container port 80 as port 8080 on the host). For Metasploitable, avoid mapping attackable ports to your public interfaces. Use internal Docker networking instead.</p>
</li>
<li><p><strong>Docker network / bridge network</strong><br />  A virtual network that Docker creates so containers can talk to each other. The default is <code>bridge</code>. Creating a dedicated user network (e.g., <code>pentest-lab</code>) gives you isolation and easier service discovery by container name.</p>
</li>
<li><p><code>docker-compose</code><br />  A tool to define and run multi-container Docker applications using a YAML file. It simplifies starting multiple containers with one command.</p>
</li>
<li><p><strong>Image registry / trust</strong><br />  Community images on Docker Hub may be outdated or malicious; prefer official images or build your own from known sources. When using images for security training, verify the origin or build from the official Metasploitable project if you can.</p>
</li>
<li><p><strong>Metasploitable (2 / 3)</strong><br />  Intentionally vulnerable system images for learning pentesting. Metasploitable2 is an older Linux VM; Metasploitable3 is newer and hosted in Rapid7’s GitHub repo. Use them in isolated labs only.</p>
</li>
<li><p><code>msfadmin:msfadmin</code><br />  The default username:password for Metasploitable2 (common entry point for labs).</p>
</li>
</ul>
<p>If you want to know how to install a container on Proxmox and deploy the metasploitable2 VM into it check the Homelab serie in the link below:</p>
<p>link: ==article coming soon==</p>
<p>Video Resource:</p>
<p>There are videos on youtube that reproduce the same thing I can refer that one:</p>
<p><a target="_blank" href="https://www.youtube.com/watch?v=U9YOBxx83A4">MarauderSec - From Ryan Yager</a></p>
]]></content:encoded></item><item><title><![CDATA[🛡️ Roadmap to Becoming an Offensive Security Professional]]></title><description><![CDATA[🚀 Introduction
Becoming an offensive security professional is not about shortcuts — it’s about building a strong foundation and mastering the basics. Like many others, I started by exploring everythi]]></description><link>https://blog.rootedn00b.tech/penetration-testing-from-0-to-junior-level</link><guid isPermaLink="true">https://blog.rootedn00b.tech/penetration-testing-from-0-to-junior-level</guid><category><![CDATA[Ethical Hacking]]></category><category><![CDATA[penetration testing]]></category><category><![CDATA[tryhackme]]></category><category><![CDATA[offensive-security]]></category><dc:creator><![CDATA[rootedn00b]]></dc:creator><pubDate>Sun, 14 Sep 2025 22:53:51 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68c0dfbd87ef198da3039525/21f304bd-da8f-443c-970b-5b93a900ab95.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>🚀 Introduction</h3>
<p>Becoming an offensive security professional is not about shortcuts — it’s about building a strong foundation and mastering the basics. Like many others, I started by exploring everything without a clear direction. Eventually, I realized that having a structured roadmap makes all the difference.</p>
<p>Coming from a <strong>Networking &amp; Windows Server administration background</strong>, web security was my weak point. Over time, I achieved certifications such as <strong>eJPTv2, PNPT, CRTA, CRTP, and CRTO</strong>, alongside practical learning through <a href="https://tryhackme.com/"><strong>TryHackMe</strong></a> (Junior Penetration Tester, Offensive Security, Web Fundamentals, AD attack &amp; enumeration) and countless labs.</p>
<p>👉 <strong>Good hackers don’t guess — they understand how things really work.</strong> good foundation is everything, <em><strong>the good hacker don't guess but understand how things really work</strong></em>.</p>
<p>This article outlines the roadmap I used to build my offensive security skillset.</p>
<h2>🧩 Step 1 – Build a Strong Foundation</h2>
<h3>🌐 Networking</h3>
<ul>
<li><p>Network Fundamentals</p>
</li>
<li><p>Wireshark</p>
</li>
<li><p>Network Security</p>
</li>
<li><p>Network Exploitation Basics</p>
</li>
</ul>
<h3>🕸️ Web Basics</h3>
<ul>
<li><p>How the Web Works</p>
</li>
<li><p>Web Hacking Fundamentals</p>
</li>
<li><p>Burp Suite Essentials</p>
</li>
</ul>
<h3>💻 Operating Systems</h3>
<ul>
<li><p>Linux Fundamentals</p>
</li>
<li><p>Windows &amp; Active Directory Fundamentals</p>
</li>
<li><p>Cryptography</p>
</li>
</ul>
<h3>⌨️ Power of the Terminal</h3>
<ul>
<li>Command Line Mastery</li>
</ul>
<h3>🐍 Scripting</h3>
<ul>
<li>Scripting for Pentesters</li>
</ul>
<hr />
<h2>🔐 Step 2 – Cybersecurity Fundamentals</h2>
<ul>
<li><p>Introduction to Cyber Security</p>
</li>
<li><p>Security Engineering Basics</p>
</li>
<li><p>Introduction to Offensive &amp; Defensive Security</p>
</li>
<li><p>Vulnerability Research</p>
</li>
<li><p>Security Solutions</p>
</li>
<li><p>Introduction to Pentesting</p>
</li>
</ul>
<hr />
<h2>🛠️ Step 3 – Hands-On Hacking Practice</h2>
<p>Understanding tools is one thing; <strong>knowing how they work under the hood is another</strong>.</p>
<ul>
<li><p>Pentesting Tools</p>
</li>
<li><p>Offensive Security Tooling</p>
</li>
<li><p>Exploitation Basics</p>
</li>
<li><p>Privilege Escalation</p>
</li>
<li><p>Shell &amp; Access Management</p>
</li>
<li><p>Common Attacks</p>
</li>
<li><p>Breaching Active Directory</p>
</li>
</ul>
<p>Once you’re comfortable with the first three steps, your <strong>real offensive security journey begins</strong>.</p>
<hr />
<h2>✅ To-Do List</h2>
<ul>
<li><p>Complete all the <strong>easy rooms</strong> on TryHackMe</p>
</li>
<li><p>Follow the <strong>Offensive Pentesting, Junir Penetration tester, Web fundamentals, Networking path</strong></p>
</li>
</ul>
<h2>🎯 What’s Next?</h2>
<p>Once your foundation is solid, it’s time to specialize:</p>
<ul>
<li><p><strong>Web Application Pentesting</strong> (via TryHackMe &amp; PortSwigger Academy)</p>
</li>
<li><p><strong>Red Teaming</strong> (simulate advanced attackers)</p>
</li>
<li><p><strong>HackTheBox CBBH</strong> certification prep</p>
</li>
</ul>
<p>As you progress, challenge yourself with <strong>medium and hard labs</strong>. If you get stuck, it’s okay to check a write-up or walkthrough — but always come back and try again on your own.</p>
<hr />
<h2>📝 The Importance of Note-Taking</h2>
<p>A crucial habit in your journey is <strong>note-taking</strong>. Every test, every lab, every attack path should be documented. This not only reinforces your learning but also prepares you for real-world engagements.</p>
<p>A good structure for write-ups includes:</p>
<ol>
<li><p>Information Gathering</p>
</li>
<li><p>Scanning &amp; Enumeration</p>
</li>
<li><p>Vulnerability Research</p>
</li>
<li><p>Exploitation</p>
</li>
<li><p>Privilege Escalation</p>
</li>
<li><p>Post-Exploitation</p>
</li>
<li><p>Lateral Movement</p>
</li>
<li><p>Pivoting</p>
</li>
<li><p>Reporting</p>
</li>
</ol>
<hr />
<h2>📚 Resources</h2>
<p>Here are some useful resources to kickstart your journey using Tryhackme:</p>
<ul>
<li><p>🔗 <a href="https://tryhackme.com/">TryHackMe</a> — Practical labs for hands-on learning</p>
</li>
<li><p>🧪 <a href="https://portswigger.net/">PortSwigger</a> Academy — Free web application security training</p>
</li>
<li><p>⚡ <a href="https://hackthebox.com/">HackTheBox</a> — Advanced labs and certifications</p>
</li>
</ul>
<hr />
<h2>🏁 Final Thoughts</h2>
<p>Offensive security is not just about tools or exploits — it’s about understanding systems deeply, thinking like an attacker, and documenting everything you learn.</p>
<p>This roadmap is not a race. Take your time, practice daily, and never stop learning.</p>
<blockquote>
<p><em>“The journey of an offensive security professional isn’t about becoming a script-kiddie hacker. It’s about building mastery, one layer at a time.”</em></p>
</blockquote>
<p>Stay consistent, keep hacking, and see you at the top. 🚀</p>
]]></content:encoded></item><item><title><![CDATA[I Earned My PT1 Certification from TryHackMe 🎉]]></title><description><![CDATA[I’m excited to share that I’ve officially achieved the PT1 (Penetration Tester Level 1) Certification from TryHackMe! This milestone marks an important step in my journey into cybersecurity and penetration testing, and I want to take a moment to refl...]]></description><link>https://blog.rootedn00b.tech/penetration-testing-level-1-pt1-tryhackme</link><guid isPermaLink="true">https://blog.rootedn00b.tech/penetration-testing-level-1-pt1-tryhackme</guid><category><![CDATA[pentesting]]></category><category><![CDATA[tryhackme]]></category><category><![CDATA[hacking]]></category><dc:creator><![CDATA[rootedn00b]]></dc:creator><pubDate>Fri, 12 Sep 2025 18:34:29 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1757767331721/862463d5-6336-4b87-8b79-fe0cbeefc5e7.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I’m excited to share that I’ve officially achieved the <strong>PT1 (Penetration Tester Level 1) Certification</strong> from TryHackMe! This milestone marks an important step in my journey into cybersecurity and penetration testing, and I want to take a moment to reflect on what it means and how I got here.</p>
<hr />
<h2 id="heading-what-is-the-pt1-certification">What is the PT1 Certification?</h2>
<p>The PT1 is an entry-level penetration testing certification offered by <strong>TryHackMe</strong>. It’s designed to validate foundational skills in ethical hacking and cybersecurity. Unlike multiple-choice exams, the PT1 is <strong>hands-on</strong>: you’re dropped into a practical environment where you must enumerate, exploit, escalate, and prove your skills in real-world-style scenarios.</p>
<p>It’s not about theory—it’s about doing.</p>
<p>Key areas covered include:</p>
<ul>
<li><p><strong>Enumeration &amp; Reconnaissance</strong></p>
</li>
<li><p><strong>Web Application Attacks</strong></p>
</li>
<li><p><strong>Privilege Escalation</strong></p>
</li>
<li><p><strong>Password Cracking &amp; Exploitation</strong></p>
</li>
<li><p><strong>Report Writing &amp; Documentation</strong></p>
</li>
<li><p><strong>Attacking Active Directory</strong></p>
</li>
<li><p><strong>Remediation step to recover each exploited vulnerability</strong></p>
</li>
</ul>
<hr />
<h2 id="heading-my-learning-journey">My Learning Journey</h2>
<p>I started studying penetration testing through TryHackMe’s guided learning paths. What I loved most about TryHackMe is how it turns complex topics into <strong>interactive labs</strong> where you learn by breaking, fixing, and exploring systems yourself.</p>
<p>Some of the skills I strengthened along the way:</p>
<ul>
<li><p>Using tools like <strong>Nmap, Gobuster, Hashcat, and Burp Suite</strong> for reconnaissance and exploitation.</p>
</li>
<li><p>Understanding how misconfigurations lead to privilege escalation.</p>
</li>
<li><p>Practicing persistence and creative problem-solving when the “obvious” path didn’t work.</p>
</li>
<li><p>Writing reports clearly and effectively, which is often overlooked but just as important as hacking itself.</p>
</li>
</ul>
<hr />
<h2 id="heading-the-exam-experience">The Exam Experience</h2>
<p>The <strong>PT1</strong> exam was challenging, specially the web part of the exam but in the best way possible. It tested not only my technical skills but also my ability to <strong>think critically under pressure</strong>. I had to carefully enumerate the target, try different approaches, and stay organized while taking notes and screenshots for my final report.</p>
<p>This was a great reminder that penetration testing is not just about tools—it’s about mindset.</p>
<hr />
<h2 id="heading-why-this-matters">Why This Matters</h2>
<p>Achieving the PT1 certification means more than just a badge to add to my profile. It’s proof that I can approach a system like a penetration tester, find vulnerabilities, and demonstrate them responsibly.</p>
<p>It also motivates me to keep pushing further. PT1 is just the beginning—I plan to continue sharpening my skills with more advanced certifications, homelab projects, and real-world practice.</p>
<hr />
<h2 id="heading-whats-next">What’s Next?</h2>
<ul>
<li><p>Building out my <strong>homelab</strong> to simulate real enterprise environments.</p>
</li>
<li><p>Diving deeper into <strong>Active Directory attacks and defenses</strong>.</p>
</li>
<li><p>Preparing for more advanced certifications, like <strong>OSCP, CPTS, CAPE</strong>.</p>
</li>
<li><p>Sharing my journey and projects here on my blog and on my <a target="_blank" href="https://github.com/RootedN00b/Projects">Github Projects</a>.</p>
</li>
</ul>
<hr />
<h2 id="heading-exam-tip-if-you-are-one-that-journey">Exam tip if you are one that Journey</h2>
<p>If you are a beginner I would recommend to follow the <a target="_blank" href="https://tryhackme.com">Tryhackme</a>’s recommended Learning path to get ready for the exam.</p>
<p><a target="_blank" href="https://tryhackme.com/certification/junior-penetration-tester/details">Tryhackme Recommended Learning path</a></p>
<p>If you have previous Hacking experience from certifications like : TCM Security PJPT, PNPT or eLearnSecurity (eJPTv2)</p>
<p>I would recommend to follow this short path</p>
<h3 id="heading-rooms">Rooms</h3>
<p>[ ] <a target="_blank" href="https://tryhackme.com/room/owasptop102021">https://tryhackme.com/room/owasptop102021</a></p>
<p>[ ] <a target="_blank" href="https://tryhackme.com/room/sqlfundamentals">https://tryhackme.com/room/sqlfundamentals</a></p>
<p>[ ] <a target="_blank" href="https://tryhackme.com/room/sqlmapthebasics">https://tryhackme.com/room/sqlmapthebasics</a></p>
<p>[ ] <a target="_blank" href="https://tryhackme.com/room/raceconditionsattacks">https://tryhackme.com/room/raceconditionsattacks</a></p>
<p>[ ] <a target="_blank" href="https://tryhackme.com/room/sqlinjectionlm">https://tryhackme.com/room/sqlinjectionlm</a></p>
<p>[ ] <a target="_blank" href="https://tryhackme.com/room/xss">https://tryhackme.com/room/xss</a></p>
<p>[ ] <a target="_blank" href="https://tryhackme.com/room/axss">https://tryhackme.com/room/axss</a></p>
<p>[ ] <a target="_blank" href="https://tryhackme.com/room/dombasedattacks">https://tryhackme.com/room/dombasedattacks</a></p>
<p>[ ] https://tryhackme.com/room/writingpentestreports</p>
<h3 id="heading-practice">Practice</h3>
<ul>
<li>[ ] <a target="_blank" href="https://tryhackme.com/room/k2room">https://tryhackme.com/room/k2room</a></li>
</ul>
<p>Certification link: <a target="_blank" href="https://tryhackme.com/certification/junior-penetration-tester">https://tryhackme.com/certification/junior-penetration-tester</a></p>
<h2 id="heading-final-thoughts">Final Thoughts</h2>
<p>I’m proud to have earned the <strong>PT1</strong> certification, but this is just one step in a much larger journey. Cybersecurity is a field where learning never stops, and I’m excited to keep growing.</p>
<p>If you’re starting out and wondering whether to pursue <strong>PT1</strong>: <strong>do it</strong>. It’s beginner-friendly, practical, and a confidence booster for anyone serious about penetration testing.</p>
<p>Stay tuned for more write-ups, projects, and lessons I’ll be sharing along the way. 🚀</p>
<h2 id="heading-thank-you">Thank you</h2>
<p>I would like to take a moment to say thank you to some people who are always in some how pushing me in that endless journey of penetration testing</p>
<p><a target="_blank" href="http://linkedin.com/in/gbeauboeuf">Gael Beauboeuf</a></p>
<p><a target="_blank" href="http://linkedin.com/in/l14m">Morad Halmi</a></p>
<p><a target="_blank" href="http://linkedin.com/in/mpotisambo-zamea-007268190">Mpotisambo</a></p>
<p><a target="_blank" href="http://linkedin.com/in/roydel">Roydel Foster</a></p>
<p><a target="_blank" href="http://linkedin.com/in/djefferson-saintilus">Djefferson Saintilus</a></p>
<p><a target="_blank" href="http://linkedin.com/in/christmarc-louissaint-01219996">Christ Louissaint</a></p>
<h3 id="heading-certification">Certification</h3>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1757767392941/8d22722a-8cf3-4ce9-ab10-1b9e97ffb043.png" alt class="image--center mx-auto" /></p>
<p>Exam link: <a target="_blank" href="https://tryhackme.com/certification/junior-penetration-tester/details">Tryhackme PT1</a></p>
]]></content:encoded></item></channel></rss>