<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cyber Security on Musings of a Pentester</title><link>https://blog.tobyjackson.io/categories/cyber-security/</link><description>Recent content in Cyber Security on Musings of a Pentester</description><generator>Hugo -- 0.154.2</generator><language>en-gb</language><lastBuildDate>Sat, 31 Dec 2022 22:31:26 +0000</lastBuildDate><atom:link href="https://blog.tobyjackson.io/categories/cyber-security/index.xml" rel="self" type="application/rss+xml"/><item><title>10 Things I Learnt in My First Year as a Penetration Tester</title><link>https://blog.tobyjackson.io/blog/10-things-i-learnt-in-my-first-year-as-a-penetration-tester/</link><pubDate>Sat, 31 Dec 2022 22:31:26 +0000</pubDate><guid>https://blog.tobyjackson.io/blog/10-things-i-learnt-in-my-first-year-as-a-penetration-tester/</guid><description>A reflective look back on what my first year as penetration tester/cyber security consultant taught me, and how those lessons can potentially help you.</description></item><item><title>Hack the Box Walkthroughs: Hathor</title><link>https://blog.tobyjackson.io/blog/hack-the-box-walkthroughs-hathor/</link><pubDate>Sat, 19 Nov 2022 18:06:04 +0000</pubDate><guid>https://blog.tobyjackson.io/blog/hack-the-box-walkthroughs-hathor/</guid><description>Hathor from Hack the Box was an Insane Windows machine that involves exploiting a misconfigured file upload, then identifying credentials in log files, before performing some DLL hijacking and finally, abusing an account with replication rights to obtain the administrator&amp;rsquo;s password hash.</description></item></channel></rss>