Othmane Moutaouakkil
LinkedInGitHub
  • Introduction
  • OSCP Journey
    • HTB
      • HTB Linux Boxes
      • HTB Windows Boxes
  • Write-Ups
    • TCM Security
      • Practical Ethical Hacking
        • Networking Refresher
        • The Ethical Hacker Methodology
        • Information Gathering (Reconnaissance)
        • Scanning & Enumeration
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
        • New Capstone
        • Active Directory (AD)
          • AD Overview
          • AD Lab Build
          • Attacking AD: Initial Attack Vectors
          • Attacking AD: Post-Compromise Enumeration
          • Attacking AD: Post-Compromise Attacks
          • We've Compromised the Domain - Now What?
          • Additional AD Attacks
          • AD Case Studies
        • Post Exploitation
        • Web Application Enumeration, Revisited
        • Find & Exploit Common Web Vulnerabilities
        • Wireless Penetration Testing
        • Legal Documents and Report Writing
      • Open-Source Intelligence (OSINT)
    • Hacking Challenges
      • OTW
        • Bandit
          • Level 0
          • Level 0 → 1
          • Level 1 → 2
          • Level 2 → 3
          • Level 3 → 4
          • Level 4 → 5
          • Level 5 → 6
          • Level 6 → 7
          • Level 7 → 8
          • Level 8 → 9
          • Level 9 → 10
          • Level 10 → 11
          • Level 11 → 12
          • Level 12 → 13
          • Level 13 → 14
          • Level 14 → 15
          • Level 15 → 16
          • Level 16 → 17
          • Level 17 → 18
          • Level 18 → 19
        • Natas
        • Leviathan
        • Krypton
        • Narnia
        • Behemoth
        • Utumno
        • Maze
        • Vortex
        • Manpage
        • Drifter
        • FormulaOne
      • THM
  • Research
  • Resume
Powered by GitBook
On this page
  • My hacking Journey: An Introduction
  • Why Am I Doing This?
  • What Can You Expect?
  • A Work In Progress:
  • Contact Me

Was this helpful?

Introduction

NextOSCP Journey

Last updated 7 months ago

Was this helpful?

My hacking Journey: An Introduction

Hey there! Welcome to my corner of the internet where I document my adventures in the world of hacking. I'm , a Computer and Software Engineering student with a growing passion for cybersecurity and ethical hacking. This site is essentially my digital journal, a place where I can share my progress, struggles, and victories as I dive into this fascinating field.

Why Am I Doing This?

Good question! There are a few reasons:

  • Knowledge Reinforcement – You know how they say the best way to learn something is to teach it? Well, I'm taking that to heart. By writing about what I'm learning, I'm forcing myself to really understand the concepts. It's like having a conversation with my future self.

  • Personal Reference – This site serves as my own personal cheat sheet. Whenever I need to recall a specific technique or tool, I know exactly where to look.

What Can You Expect?

As I progress through various courses, tackle CTF challenges, and experiment with different tools, I'll be documenting it all here. Expect to see:

  • Detailed write-ups of challenges I've solved

  • Notes on new concepts I'm grappling with

  • Reviews of courses and resources I'm using

  • My thoughts on the latest trends in cybersecurity

A Work In Progress:

I'm at the beginning of this journey, and I have no illusions about becoming an overnight expert. This site will grow and evolve as I do.

If you're a fellow learner, I hope you find something useful here. If you're an experienced pro, feel free to email me some wisdom – I'm always eager to learn!

So, buckle up and join me on this wild ride through the world of ethical hacking. It's going to be a challenge, but hey, that's half the fun!

Let's hack and learn together!

-- Othmane

Contact Me

Email Address:

LinkedIn:

GitHub:

Othmane Moutaouakkil
Othmane Moutaouakkil
Othmane Moutaouakkil
Othmane Moutaouakkil