Skip to content
ZEROMISCONFIG · BLOG

Recent Articles

FEATURED · WEB · APR 2026

Remote Code Execution in Pro-SaaS v4.2

Authentication bypass lead to pre-auth RCE via insecure deserialization in the management portal.

webhardening
DOCKER · APR 2026

Cloud-Native Credential Harvesting

Deep-dive into IMDSv2 exfiltration techniques in multi-tenant Kubernetes environments.

dockerlinuxcloud
ACTIVE-DIRECTORY · APR 2026

Active Directory Privilege Escalation

Analysis of a novel technique to escalate privileges from a standard domain user to Domain Admin using misconfigured ACLs.

active-directoryhardening
N8N · APR 2026

Securing n8n Webhooks from SSRF

How to effectively protect your n8n automation instances against Server-Side Request Forgery attacks.

n8nweb
CTF · MAR 2026

HackTheBox CyberApocalypse 2026: Web Writeup

Detailed walkthrough of the hardest Web Exploitation challenge in the HTB CyberApocalypse CTF, chaining XSS and Prototype Pollution.

ctfweb
LINUX · FEB 2026

Defeating eBPF Rootkits in Linux Environments

How modern attackers use Extended Berkeley Packet Filter to build stealthy rootkits, and how defenders can detect them.

linuxhardening