Skip to content
@MoriartyPuth-Labs

MoriartyPuth Labs and Walkthroughs

Collection of my labs walkthrough and write up of real life security case study

🛡️ Security Labs & Case Studies

Welcome to the central repository for my security research, penetration testing labs, and real-world study cases. This organization serves as a documented journey through various attack vectors, defensive strategies, and detailed walkthroughs.


📂 Repository Structure

  • [Lab-Name]-Walkthroughs: Step-by-step guides for platforms like Hack The Box, TryHackMe, and custom Proving Grounds.
  • Real-World-Analysis: Deep dives into historical breaches and modern CVEs with a focus on "how it happened" and "how to fix it."
  • Network-Simulations: Configurations and audit reports for simulated enterprise environments.
  • Tool-Labs: Experiments with automated scanners, forensics suites, and custom-built scripts.

🔬 Featured Case Studies

Case Study Focus Area Complexity
Active Directory Exploitation Lateral Movement & Kerberoasting Hard
Web API Vulnerabilities Broken Access Control & Logic Flaws Medium
Digital Forensics Memory Analysis & Artifact Recovery Hard

🛠️ Methodology

Every lab and writeup follows a standardized reporting structure:

  1. Reconnaissance: Information gathering and service enumeration.
  2. Vulnerability Assessment: Identifying potential entry points.
  3. Exploitation: Documenting the "Proof of Concept" (PoC).
  4. Post-Exploitation: Privilege escalation and persistence checks.
  5. Remediation: Actionable advice for securing the system.

⚠️ Disclaimer

The contents of these repositories are for educational and ethical security testing purposes only. All labs are performed in controlled environments. Unauthorized access to computer systems is illegal.


Tip

Check the individual repository README files for specific setup instructions and lab requirements.

Pinned Loading

  1. CSS-GDIN-Security-Case-Study CSS-GDIN-Security-Case-Study Public

    API Broken Access Control & PII Remediation

  2. Full-Chain-SQLi-Case-Study Full-Chain-SQLi-Case-Study Public

    A comprehensive technical walk-through of an end-to-end SQL Injection (SQLi) attack chain conducted in a controlled lab environment for research and learning.

Repositories

Showing 10 of 17 repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…