Skip to content

Penetration Testing Write-Ups & Research

Welcome to my technical portfolio.
This space documents selected penetration testing exercises, vulnerability research, and exploitation walkthroughs performed in controlled environments such as Hack The Box.

Each write-up aims to demonstrate:

  • A methodical approach to vulnerability identification and exploitation
  • Clear documentation of tools, reasoning, and attack paths
  • Actionable remediation guidance when applicable

๐Ÿ“‚ Categories

  • Machines
    Step-by-step penetration test walkthroughs organized by difficulty and platform.

  • Research
    Technical notes on interesting vulnerabilities, configurations, or security mispractices.


๐Ÿ‘ค About the Author

Jose Raul Bongiovani | b0nyo
Certified Penetration Testing Specialist (CPTS) | Penetration Tester | Offensive Security Enthusiast

With a focus on Active Directory exploitation, network enumeration, and post-exploitation techniques, my goal is to maintain a structured methodology consistent with professional red team and internal assessment standards.

Contact: LinkedIn ยท GitHub ยท Hack The Box


โ€œPrecision, documentation, and reproducibility are key components of every effective penetration test.โ€