# Hello!

## What's This?

This is my notebook where I document all my security-related experiences, from HackTheBox writeups, to bug bounty findings, and personal blogs about random security topics.

{% hint style="warning" %}
**What am I doing now?** I have decided to spend a year on bug bounties to learn and see what I can learn and find.
{% endhint %}

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/websec/disclosed-bugs>" %}

## Content

### `whoami`

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/welcome/about-me>" %}

### Blogs

I (try) to write some blogs about cybersecurity and anything interesting I find, which are viewable on the left under the 'Blogs' section.

### Starting in InfoSec

My take on how to get into cybersecurity, about CTFs and hacking:

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/infosec/getting-started>" %}

### Web Vulnerabilities

Stuff about MVC, web vulnerabilities, Portswigger Web Security Academy Labs writeups with exploit scripts and disclosed bugs:

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/websec/web-vulnerabilities>" %}

### Buffer Overflows

Buffer overflows and some variations of it:

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/bof/prior-knowledge>" %}

### Active Directory

Kerberos, Microsoft AD hacking, moving around a simulated corporate network:

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/ad/ad>" %}

### Writeups

Writeups from HTB and PGP make up the majority of this Gitbook.

#### HackTheBox

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/writeups/hackthebox>" %}

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/writeups/htb-season-3>" %}

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/writeups/htb-season-2>" %}

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/writeups/htb-season-1>" %}

#### Proving Grounds Practice

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/writeups/proving-grounds-practice>" %}

### Defence Evasion

Stuff about OS fundamentals, malware detection mechanisms and techniques to evade them I picked up for fun:

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/evasion/>" %}

### Adversary Emulation

Adversary emulation and red teaming knowledge:

{% embed url="<https://rouvin.gitbook.io/ibreakstuff/adversary-emulation/emulation>" %}

## Disclaimer

I do not claim to be the most correct, the best, or even remotely good at security. I'm just a guy that is really into security and wants to learn as much as possible.

I do not condone any illegal activity done using any methods in this notebook. All of the concepts listed here are for **educational purposes** only. What you decide to do with these skills is on you (basically, you can't sue me, not that I was using ground-breaking techniques anyway).
