r00tsec@sh:~#
HomeAboutBlogToolsPublic Talks

© 2025 r00tsec. All rights reserved.

r00tsec

Penetration Tester

Specialized in discovering and exploiting security vulnerabilities in web applications, networks, and infrastructure to help organizations improve their security posture.

terminal — r00tsec@sh:~#
|

Expertise

Web Application Security

Comprehensive security testing of web applications, identifying vulnerabilities like SQL injection, XSS, authentication bypasses, and business logic flaws.

Phishing Campaigns

Advanced social engineering and phishing simulations to test user awareness and organizational security culture through sophisticated attack scenarios.

Internal Network Testing

Deep penetration testing of internal networks, lateral movement techniques, privilege escalation, and comprehensive infrastructure security assessments.

Latest News

View all posts →
SCCMMECMActive DirectoryPenetration TestingsccmhunterReconpssreconnetexecnxcsccm enumerationenumeration2025-09-30T10:06:05+00:00

SCCM Exploitation: Part 3 - Reconnaissance and Enumeration

Recon from unauthenticated and authenticated angles using techniques and tools such as Nmap, RPC/IIS fingerprinting, LDAP/WMI to locate MPs/DPs and exposed package artifacts.

Read full analysis →
SCCMMECMActive DirectoryPenetration TestingPXENAATask Sequences2025-08-22T00:00:00+00:00

SCCM Exploitation: Part 2 – Collections, Deployment, PXE

Exploring SCCM’s collections, variables, task sequences, network access accounts, and PXE boot to understand the in-depth process behind deployment and operating system provisioning.

Read full analysis →
SCCMActive DirectoryPenetration TestingMECM2025-08-12T00:00:00+00:00

SCCM Exploitation: Part 1 - Background & Architecture

Breaking down and understanding Microsoft SCCM’s architecture, core components, different deployment models, and client installation methods before diving deeper into exploitation later.

Read full analysis →