ZEROMISCONFIG · BLOG
Recent Articles
Remote Code Execution in Pro-SaaS v4.2
Authentication bypass lead to pre-auth RCE via insecure deserialization in the management portal.
webhardening
Cloud-Native Credential Harvesting
Deep-dive into IMDSv2 exfiltration techniques in multi-tenant Kubernetes environments.
dockerlinuxcloud
Active Directory Privilege Escalation
Analysis of a novel technique to escalate privileges from a standard domain user to Domain Admin using misconfigured ACLs.
active-directoryhardening
Securing n8n Webhooks from SSRF
How to effectively protect your n8n automation instances against Server-Side Request Forgery attacks.
n8nweb
HackTheBox CyberApocalypse 2026: Web Writeup
Detailed walkthrough of the hardest Web Exploitation challenge in the HTB CyberApocalypse CTF, chaining XSS and Prototype Pollution.
ctfweb
Defeating eBPF Rootkits in Linux Environments
How modern attackers use Extended Berkeley Packet Filter to build stealthy rootkits, and how defenders can detect them.
linuxhardening