<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://br34chy.github.io/</id><title>br34chy</title><subtitle>just a sec blog</subtitle> <updated>2026-02-24T21:03:22-06:00</updated> <author> <name>br34chy</name> <uri>https://br34chy.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://br34chy.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://br34chy.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 br34chy </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Proving Grounds Twiggy: Backport</title><link href="https://br34chy.github.io/posts/PGLab-Twiggy/" rel="alternate" type="text/html" title="Proving Grounds Twiggy: Backport" /><published>2026-02-12T22:00:00-06:00</published> <updated>2026-02-12T22:00:00-06:00</updated> <id>https://br34chy.github.io/posts/PGLab-Twiggy/</id> <content type="text/html" src="https://br34chy.github.io/posts/PGLab-Twiggy/" /> <author> <name>br34chy</name> </author> <category term="Labs" /> <category term="Proving Grounds" /> <summary>Imagined a forest. It was a twig. Lesson: Don’t overthink. Think in primitives. Twiggy (PG Lab) revolves around a backport regression. A fix from a newer version was applied to an older codebase, but architectural differences introduced unintended exposure. When code is transplanted without full context, assumptions break. The machine is rated easy and community-rated intermediate. It sh...</summary> </entry> <entry><title>Proving Grounds PlanetExpress: Silent S</title><link href="https://br34chy.github.io/posts/PGLab-PlanetExpress/" rel="alternate" type="text/html" title="Proving Grounds PlanetExpress: Silent S" /><published>2026-02-08T22:00:00-06:00</published> <updated>2026-02-24T21:02:37-06:00</updated> <id>https://br34chy.github.io/posts/PGLab-PlanetExpress/</id> <content type="text/html" src="https://br34chy.github.io/posts/PGLab-PlanetExpress/" /> <author> <name>br34chy</name> </author> <category term="Labs" /> <category term="Proving Grounds" /> <summary>Trusted relay. Privilege carried. Lesson: trusted services can quietly carry privilege where it doesn’t belong. SUID Misconfiguration PlanetExpress (PG Lab) is an example of SUID (Set User ID/setuid) misconfiguration. SUID abuse occurs when a service runs with root level privilege. In file permissions, SUID appears as an s, for example: -rwsr--r--. Attacker can use that service to cross...</summary> </entry> <entry><title>Proving Grounds Access: Master Key</title><link href="https://br34chy.github.io/posts/PGLab-Access/" rel="alternate" type="text/html" title="Proving Grounds Access: Master Key" /><published>2026-01-29T22:00:00-06:00</published> <updated>2026-02-10T23:19:58-06:00</updated> <id>https://br34chy.github.io/posts/PGLab-Access/</id> <content type="text/html" src="https://br34chy.github.io/posts/PGLab-Access/" /> <author> <name>br34chy</name> </author> <category term="Labs" /> <category term="Proving Grounds" /> <summary>Restricted upload. Trust misplaced. Lesson: small upload decisions can quietly lead to SYSTEM. From Restricted File Upload to SYSTEM Access (PG Lab) began with a web-layer attack. A restricted file upload proved insufficient, unfolding into a chain of access weaknesses. This aligns with James Reason’s Swiss cheese model: security failures occur when multiple small weaknesses line up. ...</summary> </entry> <entry><title>Proving Grounds Heist: Getaway</title><link href="https://br34chy.github.io/posts/PGLab-Heist/" rel="alternate" type="text/html" title="Proving Grounds Heist: Getaway" /><published>2026-01-25T22:00:00-06:00</published> <updated>2026-02-10T23:19:58-06:00</updated> <id>https://br34chy.github.io/posts/PGLab-Heist/</id> <content type="text/html" src="https://br34chy.github.io/posts/PGLab-Heist/" /> <author> <name>br34chy</name> </author> <category term="Labs" /> <category term="Proving Grounds" /> <summary>SMB signing enabled. NTLM still leaked. Lesson: outbound authentication is often the real attack surface. SSRF via NTLMv2 Abuse Heist (PG Lab) demonstrates an SSRF (Server-Side Request Forgery) abuse path that enables NTLMv2 credential capture and relay, leading to local privilege escalation on a Windows system. HuWanyu’s public walkthrough was used as a reference during analysis. His endg...</summary> </entry> <entry><title>Proving Grounds Internal: No Metasploit</title><link href="https://br34chy.github.io/posts/PGLab-Internal/" rel="alternate" type="text/html" title="Proving Grounds Internal: No Metasploit" /><published>2026-01-22T22:00:00-06:00</published> <updated>2026-02-10T23:19:58-06:00</updated> <id>https://br34chy.github.io/posts/PGLab-Internal/</id> <content type="text/html" src="https://br34chy.github.io/posts/PGLab-Internal/" /> <author> <name>br34chy</name> </author> <category term="Labs" /> <category term="Proving Grounds" /> <summary>Same exploit. Same payload. Worked on macOS. Failed on PC. Lesson: exploitation isn’t just about the vulnerability, it’s about how tools and environments interact with it. Exploited Without Metasploit, Yet Befuddled Internal (PG Lab) machine was compromised without Metasploit on a MacBook Pro. Replicating the same process on a PC failed. Environmental might be the issue rather than expl...</summary> </entry> </feed>
