<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://morimori-dev.github.io/</id> <title>morimori Security Blog</title> <subtitle>Cybersecurity portfolio featuring writeups for OSCP Proving Grounds, Hack The Box, and TryHackMe machines, along with technical blog posts.</subtitle> <updated>2026-04-27T05:00:32+09:00</updated> <author> <name>Paul</name> <uri>https://morimori-dev.github.io/</uri> </author> <link rel="self" type="application/atom+xml" href="https://morimori-dev.github.io/feed.xml"/> <link rel="alternate" type="text/html" hreflang="en" href="https://morimori-dev.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Paul </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry> <title>OSCP 合格体験記</title> <link href="https://morimori-dev.github.io/posts/oscp-passed-ja/" rel="alternate" type="text/html" title="OSCP 合格体験記" /> <published>2026-04-27T00:00:00+09:00</published> <updated>2026-04-27T05:59:54+09:00</updated> <id>https://morimori-dev.github.io/posts/oscp-passed-ja/</id> <content type="text/html" src="https://morimori-dev.github.io/posts/oscp-passed-ja/" /> <author> <name>Paul</name> </author> <category term="TechBlog" /> <summary>OSCP (OffSec Certified Professional) 合格までの学習ロードマップ、PEN-200 / Proving Grounds / HTB の活用方法、24時間試験の時間配分、Buffer Overflow撤廃後の試験傾向、そして実際に試験で使った自作チートシート (github.com/morimori-dev/OSCP) を公開。これから受験する方への実践的なガイド。</summary> </entry> <entry> <title>Proving Grounds - Vault (Windows)</title> <link href="https://morimori-dev.github.io/posts/pg-vault/" rel="alternate" type="text/html" title="Proving Grounds - Vault (Windows)" /> <published>2026-03-24T00:00:00+09:00</published> <updated>2026-03-24T00:00:00+09:00</updated> <id>https://morimori-dev.github.io/posts/pg-vault/</id> <content type="text/html" src="https://morimori-dev.github.io/posts/pg-vault/" /> <author> <name>Paul</name> </author> <category term="Proving Grounds" /> <category term="Windows" /> <summary>Proving Grounds Vault Windows walkthrough covering SMB guest RID brute force, NTLMv2 hash theft via ntlm_theft, and GPO abuse privilege escalation.</summary> </entry> <entry> <title>Proving Grounds - Vault (Windows)</title> <link href="https://morimori-dev.github.io/posts/pg-vault-ja/" rel="alternate" type="text/html" title="Proving Grounds - Vault (Windows)" /> <published>2026-03-24T00:00:00+09:00</published> <updated>2026-03-24T00:00:00+09:00</updated> <id>https://morimori-dev.github.io/posts/pg-vault-ja/</id> <content type="text/html" src="https://morimori-dev.github.io/posts/pg-vault-ja/" /> <author> <name>Paul</name> </author> <category term="Proving Grounds" /> <category term="Windows" /> <summary>Proving Grounds Vault Windows マシン解説。SMB Guest RID ブルートフォース、ntlm_theft による NTLMv2 ハッシュ窃取、GPO 悪用による権限昇格を解説。</summary> </entry> <entry> <title>Proving Grounds - Resourced (Windows)</title> <link href="https://morimori-dev.github.io/posts/pg-resourced/" rel="alternate" type="text/html" title="Proving Grounds - Resourced (Windows)" /> <published>2026-03-24T00:00:00+09:00</published> <updated>2026-03-24T00:00:00+09:00</updated> <id>https://morimori-dev.github.io/posts/pg-resourced/</id> <content type="text/html" src="https://morimori-dev.github.io/posts/pg-resourced/" /> <author> <name>Paul</name> </author> <category term="Proving Grounds" /> <category term="Windows" /> <summary>Proving Grounds Resourced Windows walkthrough covering RPC null session user enumeration, LDAP description password leak, ntds.dit extraction, and RBCD privilege escalation.</summary> </entry> <entry> <title>Proving Grounds - Resourced (Windows)</title> <link href="https://morimori-dev.github.io/posts/pg-resourced-ja/" rel="alternate" type="text/html" title="Proving Grounds - Resourced (Windows)" /> <published>2026-03-24T00:00:00+09:00</published> <updated>2026-03-24T00:00:00+09:00</updated> <id>https://morimori-dev.github.io/posts/pg-resourced-ja/</id> <content type="text/html" src="https://morimori-dev.github.io/posts/pg-resourced-ja/" /> <author> <name>Paul</name> </author> <category term="Proving Grounds" /> <category term="Windows" /> <summary>Proving Grounds Resourced Windows マシン解説。RPC null session によるユーザー列挙、LDAP description パスワード漏洩、ntds.dit 抽出、RBCD 権限昇格を解説。</summary> </entry> </feed>
