// offensive security

Maks Huseynli

Offensive Security Practitioner

Structured offensive analysis and exploit breakdowns.
Documenting the methodology behind the compromise.

View case studies
06
Writeups
Web
Primary Focus
OSCP
In Progress

Case Studies

Web Linux Medium

Interceptor — TryHackMe

.bak source disclosure leaks admin credentials. OTP bypassed via mass-assignment. Client-side-only filter leaves feed importer open to backtick command injection.

Read writeup →
Web Linux Medium

Recruit Portal — TryHackMe

Exposed mail log leaks internal email hinting at config.php. SSRF via file:// reads credentials. Authenticated dashboard has raw SQLi — dumped with sqlmap for full admin access.

Read writeup →
Active Directory Windows Hard

Logging — Hack The Box

Shadow Credentials against an MSA, DLL hijack via scheduled task, ESC17 ADCS abuse and WSUS MitM for SYSTEM on a Windows Server 2019 DC.

Read writeup →
Web Linux Medium

DevArea — Hack The Box

JAR analysis, CVE-2022-46364 SSRF→LFI for credential extraction, Hoverfly command injection RCE, and writable bash binary replacement for root.

Read writeup →
Web Medium

Conversor — Hack The Box

Input validation analysis on a conversion utility. Exploitation via crafted payloads to achieve unintended code paths and flag extraction.

Read writeup →
Web Medium

Bookstore — TryHackMe

REST API enumeration through fuzzing, authentication bypass, and local file inclusion chain leading to remote code execution.

Read writeup →

No results found for that query.

Exploit Analysis

Exploit Analysis Advanced

Exploit-Chain-CVE-2025-6018-6019

In-depth analysis of a chained exploit path across two CVEs. Vulnerability interaction, root cause breakdown, and weaponization logic.

Read analysis →