<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://0xqn.github.io/</id><title>0xqn | Blog</title><subtitle>Analysis of network attack patterns, lateral movement, and red team tradecraft in real-world enterprise environments.</subtitle> <updated>2026-03-24T17:07:45+00:00</updated> <author> <name>0xqn</name> <uri>https://0xqn.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://0xqn.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://0xqn.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 0xqn </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>HTB: Reflection, with the actual reflection</title><link href="https://0xqn.github.io/posts/HTB-Reflection/" rel="alternate" type="text/html" title="HTB: Reflection, with the actual reflection" /><published>2026-03-24T00:00:00+00:00</published> <updated>2026-03-24T00:00:00+00:00</updated> <id>https://0xqn.github.io/posts/HTB-Reflection/</id> <content type="text/html" src="https://0xqn.github.io/posts/HTB-Reflection/" /> <author> <name>0xqn</name> </author> <category term="hackthebox" /> <category term="vulnlab" /> <summary>An alternative approach to solve Reflection.</summary> </entry> </feed>
