<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://sfsf02.github.io/</id><title>Wanted: SafSec</title><subtitle>Cybersecurity blog focused on ethical hacking, security research, CTF writeups, and practical defensive security. Documenting my journey to becoming a professional security engineer.</subtitle> <updated>2026-03-29T09:21:25+00:00</updated> <author> <name>SafSec</name> <uri>https://sfsf02.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://sfsf02.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://sfsf02.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 SafSec </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>TryHackMe: Pickle Rick</title><link href="https://sfsf02.github.io/posts/Pickle-Rick-writeup/" rel="alternate" type="text/html" title="TryHackMe: Pickle Rick" /><published>2026-03-29T07:48:14+00:00</published> <updated>2026-03-29T09:21:04+00:00</updated> <id>https://sfsf02.github.io/posts/Pickle-Rick-writeup/</id> <content type="text/html" src="https://sfsf02.github.io/posts/Pickle-Rick-writeup/" /> <author> <name>SafSec</name> </author> <category term="CTF" /> <category term="TryHackMe" /> <summary>Welcome back, fellow hackers! Today, we’re tackling a super fun machine based on one of my absolute favorite shows. It has a heavy Rick and Morty theme, and if you haven’t seen the iconic episode where Rick turns himself into a pickle… drop everything and go watch it! Alright, now that you’re caught up, let’s dive in. The Mission Briefing If you want to play along and try to hack this box you...</summary> </entry> <entry><title>TryHackMe: Basic Pentesting Write-up</title><link href="https://sfsf02.github.io/posts/basic-pentesting-writeup/" rel="alternate" type="text/html" title="TryHackMe: Basic Pentesting Write-up" /><published>2026-03-16T11:20:00+00:00</published> <updated>2026-03-16T11:20:00+00:00</updated> <id>https://sfsf02.github.io/posts/basic-pentesting-writeup/</id> <content type="text/html" src="https://sfsf02.github.io/posts/basic-pentesting-writeup/" /> <author> <name>SafSec</name> </author> <category term="CTF" /> <category term="TryHackMe" /> <summary>Welcome! This is one of my very first CTF write-ups on the TryHackMe platform. In this lab, we’re going to practice the bread and butter of pentesting, following the Cyber Kill Chain. We’ll kick things off right at the beginning: reconnaissance and enumeration. Grab a coffee, and let’s dive in! Phase 1: Reconnaissance &amp;amp; Enumeration We start the party with a simple Nmap scan against the t...</summary> </entry> </feed>
