<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Ayman Azzam — Offensive Security — Writeups</title>
        <link>https://aymanazzam.is-a.dev/</link>
        <atom:link href="https://aymanazzam.is-a.dev/feed.xml" rel="self" type="application/rss+xml" />
        <description>Penetration tester and offensive security researcher specializing in web application security, Active Directory attacks, red teaming, and vulnerability research.</description>
        <language>en</language>
        <lastBuildDate>Wed, 15 Apr 2026 00:00:00 GMT</lastBuildDate>
        <pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate>
        <generator>vanilla-build-script</generator>
        <ttl>1440</ttl>
        <item>
            <title>BloodHound Edges Worth Hunting First</title>
            <link>https://aymanazzam.is-a.dev/writeups/example-bloodhound-edges.html</link>
            <guid isPermaLink="true">https://aymanazzam.is-a.dev/writeups/example-bloodhound-edges.html</guid>
            <pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate>
            <description>A practical short-list of BloodHound edges that consistently shorten attack paths in real Active Directory engagements — what to run, why it works, and what defenders should detect.</description>
            <category>BloodHound</category>
            <category>Active Directory</category>
            <category>ACL Abuse</category>
            <category>Red Team</category>
        </item>
        <item>
            <title>Stored XSS in Admin Dashboard</title>
            <link>https://aymanazzam.is-a.dev/writeups/xss-admin.html</link>
            <guid isPermaLink="true">https://aymanazzam.is-a.dev/writeups/xss-admin.html</guid>
            <pubDate>Fri, 12 Sep 2025 00:00:00 GMT</pubDate>
            <description>Discovery, reproducible PoC, and remediation guidance for a stored cross-site scripting vulnerability in an administrative messaging component.</description>
            <category>XSS</category>
            <category>Burp Suite</category>
            <category>CVSS High</category>
        </item>
        <item>
            <title>Active Directory Enumeration Workflow</title>
            <link>https://aymanazzam.is-a.dev/writeups/ad-enumeration.html</link>
            <guid isPermaLink="true">https://aymanazzam.is-a.dev/writeups/ad-enumeration.html</guid>
            <pubDate>Thu, 21 Aug 2025 00:00:00 GMT</pubDate>
            <description>End-to-end AD recon workflow used during real engagements: domain discovery, ACL analysis, BloodHound collection, and detection signals to prioritize defense.</description>
            <category>AD</category>
            <category>BloodHound</category>
            <category>PowerShell</category>
        </item>
        <item>
            <title>Kerberoasting Attack Chain</title>
            <link>https://aymanazzam.is-a.dev/writeups/kerberos-attack.html</link>
            <guid isPermaLink="true">https://aymanazzam.is-a.dev/writeups/kerberos-attack.html</guid>
            <pubDate>Sat, 05 Jul 2025 00:00:00 GMT</pubDate>
            <description>Technical research into Kerberoasting on modern Windows environments — attack chain, detection telemetry, PoC scripts, and Kerberos hardening guidance.</description>
            <category>Kerberos</category>
            <category>Impacket</category>
            <category>Hashcat</category>
        </item>
        <item>
            <title>TryHackMe Red Team Capstone</title>
            <link>https://aymanazzam.is-a.dev/writeups/tryhackme-capstone.html</link>
            <guid isPermaLink="true">https://aymanazzam.is-a.dev/writeups/tryhackme-capstone.html</guid>
            <pubDate>Sat, 14 Jun 2025 00:00:00 GMT</pubDate>
            <description>Lab-to-field writeup of a TryHackMe red team capstone — objective-based planning, execution notes, pivoting techniques, and post-engagement lessons learned.</description>
            <category>THM</category>
            <category>Red Team</category>
            <category>Pivoting</category>
        </item>
        <item>
            <title>IDOR Exploitation Analysis</title>
            <link>https://aymanazzam.is-a.dev/writeups/idor-analysis.html</link>
            <guid isPermaLink="true">https://aymanazzam.is-a.dev/writeups/idor-analysis.html</guid>
            <pubDate>Fri, 02 May 2025 00:00:00 GMT</pubDate>
            <description>In-depth analysis of an insecure direct object reference in a file-download endpoint — exploitation logic, business impact, and robust server-side authorization patterns.</description>
            <category>IDOR</category>
            <category>Burp Suite</category>
            <category>AuthZ</category>
        </item>
        <item>
            <title>Web Cache Poisoning Research</title>
            <link>https://aymanazzam.is-a.dev/writeups/web-cache-poisoning.html</link>
            <guid isPermaLink="true">https://aymanazzam.is-a.dev/writeups/web-cache-poisoning.html</guid>
            <pubDate>Fri, 18 Apr 2025 00:00:00 GMT</pubDate>
            <description>Original research on cache poisoning vectors against modern CDNs and reverse proxies — PoC payloads, cache-key analysis, and hardening recommendations.</description>
            <category>Cache</category>
            <category>CDN</category>
            <category>Research</category>
        </item>
    </channel>
</rss>
