LastStandSecurity logo LastStandSecurity Just a security analyst trying to make his way in the world

A lot of what you'll find in the write-ups and walkthroughs on this site talks about hacking techniques. All of these were carried out against known endpoints where permission to hack had been explicitly granted by the owner. All of the content on this blog is presented in the same spirit.

Before attempting any hacking, you should make yourself familiar with the applicable laws in your country, eg, The Computer Misuse act in the UK or CFAA in the US. Never attempt to hack a system for which you do not have written permission to do so.

Remember, with great power comes great responsibility.