<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://enrik-m.github.io/</id><title>Enrik Mustafa</title><subtitle>Hands-on cybersecurity labs, red team write-ups, exploit research, and practical notes from real-world offensive security training and CTF environments.</subtitle> <updated>2026-04-09T07:26:59+02:00</updated> <author> <name>enrik-m</name> <uri>https://enrik-m.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://enrik-m.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://enrik-m.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 enrik-m </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>From Easy HTB Machine to finding 8 zero-days</title><link href="https://enrik-m.github.io/posts/Camaleon-CMS-Vulnerabilties/" rel="alternate" type="text/html" title="From Easy HTB Machine to finding 8 zero-days" /><published>2026-04-09T07:20:00+02:00</published> <updated>2026-04-09T07:20:00+02:00</updated> <id>https://enrik-m.github.io/posts/Camaleon-CMS-Vulnerabilties/</id> <content type="text/html" src="https://enrik-m.github.io/posts/Camaleon-CMS-Vulnerabilties/" /> <author> <name>enrik-m</name> </author> <category term="research" /> <summary>The Beginning - Solving Facts Machine on HackTheBox After a long day of solving ctf challenges on an event that my team KSAL Cyber Team participated in, me and my cousin decided to do some easy hack the box machines to relax. We picked the first machine of season 10 which was called Facts. It was an outdated camaleon-cms build which had a couple of CVEs. First thing we did was creating an acc...</summary> </entry> <entry><title>Vulnyx - Beginner (CTF)</title><link href="https://enrik-m.github.io/posts/Vulnyx-Beginner/" rel="alternate" type="text/html" title="Vulnyx - Beginner (CTF)" /><published>2026-02-13T01:00:00+01:00</published> <updated>2026-02-13T03:15:29+01:00</updated> <id>https://enrik-m.github.io/posts/Vulnyx-Beginner/</id> <content type="text/html" src="https://enrik-m.github.io/posts/Vulnyx-Beginner/" /> <author> <name>enrik-m</name> </author> <category term="Vulnyx" /> <summary>Recon Full TCP Scan First I started by running a full tcp port scan using nmap: nmap -sV -sC -p- 192.168.163.129 --min-rate 8000 After reviewing the results, the following ports were open: PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0) | ssh-hostkey: | 3072 f0:e6:24:fb:9e:b0:7a:1a:bd:f7:b1:85:23:7f:b1:6f (RSA) | 256 99:c8:74:31:45:10:58...</summary> </entry> </feed>
