About

About

Hey! I’m Sc4n-X - CPTS / OSCP Certified

This blog is focusing on pentesting / red team notes, lab writeups, and security tooling I use in the field. I’m a CyberSercurity enthusiast and CTF addict.

“I break things so others don’t get broken.”

Focus areas

  • Recon & enumeration: host discovery, service fingerprinting, content discovery, wordlists
  • Web vulns: authN/Z flaws, SQLi, XSS, SSTI, file inclusion, upload bypass, IDOR, SSRF basics
  • Credential attacks: password spraying, bruteforce, Kerberoasting/AS-REP roast (core AD), loot & reuse
  • Linux privesc: misconfigs (sudoers, SUID), PATH/Docker abuses, NFS/cron, kernel & capabilities
  • Windows privesc: UAC bypass patterns, service misconfigs, DLL hijacking, token abuse, registry/WSUS tricks
  • Shells & pivoting: reverse/bind shells, socat/chisel/SSH tunnels, port-fw, proxychains + SOCKS
  • Post-exploitation: data hunting, persistence, AV/EDR-aware OPSEC basics
  • Reporting: clear impact, reproducible steps, and actionable remediation

Values

  • Reproducible exploitation
  • Clear remediation steps
  • No drama, just signal

Contact

  • Email: contact@deeproot.me

PGP

  • Key ID: 0x30EF492A
  • Fingerprint: 438A 957F C45D ABC6 9252 EFB8 E5D3 548D 30EF 492A
  • Public key: Download (ASC)

Disclaimer: Content is for educational purposes. Findings and opinions are my own and do not represent my employer or clients.