How I Found a Remote Code Execution Vulnerability in the Database Restore Function - CVE-2026-40484
A deep technical analysis of how I found this vulnerability from scratch all the way to receiving the CVE ID.
Technical notes and methodology
Security tools guides
THM & HTB solutions
Python & Bash for security
Vulnerability analysis & research
A deep technical analysis of how I found this vulnerability from scratch all the way to receiving the CVE ID.
Introduction to Active Directory structure and authentication protocols
The most common Active Directory attacks used in red team engagements
Lateral movement techniques for pivoting between machines in Active Directory environments
Using BloodHound to discover shortest attack paths to Domain Admin
Deep technical analysis of JNDI Injection vulnerability patterns — discovery, exploitation, and defense