Breaking My Own Infrastructure: 12 Days, 19 Findings, 3 False Positives
Twelve days ago I opened a terminal, pointed curl at our staging API, and started breaking things. I didn’t have a plan. I didn’t have a ...
Practical engineering articles on Linux, AWS, penetration testing, and the tools that keep modern systems running.

Linux Permissions and File Types Explained by Infographic and Exercises. Perfect for Your Morning Coffee Read.
Twelve days ago I opened a terminal, pointed curl at our staging API, and started breaking things. I didn’t have a plan. I didn’t have a ...
I shipped a false positive to my team. In bold. With a CRITICAL severity tag. And I was wrong. Not “wrong about a detail” wrong. Wrong a...
Rate limiting is supposed to stop brute-force attacks. Ours didn’t. Not because the rate limiter was broken – it worked perfectly. The pr...
I was testing my own finance records. Checking that the API returned the right data for my user. Standard BOLA test – try accessing someo...
I logged out. Then I used my old refresh token. It still worked. I used it again. Still worked. Five times. Ten times. A week later. Sti...
I wasn’t supposed to be awake at 3 AM. But I’d had too much coffee and my brain wouldn’t shut off, so I figured I’d do one more test befo...
The best part about doing security testing on your own systems is that you can be as reckless as you want. The worst part is realizing yo...
I deleted my own account today. Not on purpose. I’m not that chaotic. I was testing something, and then… I couldn’t log in anymore. Let...
I was supposed to be testing SQL injection. That’s what my notes said: “Test for SQL injection in search endpoints.” But you know how it ...