Attack
Offensive cybersecurity, red teaming, and penetration testing

My CTF Methodology
In this post, I examine the steps I take to approach a typical CTF in the form of a vulnerable target (also known as boot2root), and elaborate on steps at each phase.