<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://blog.infamoussyn.com/category/ctf-wargames/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/category/wifi/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/auscert/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/csaw/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/ctf/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/cysca/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/database/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/exploit/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/featured/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/game/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/hack-lu/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/honeynet/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/k17/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/mitm/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/mysql/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/networking/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/overthewire/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/research/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/review/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/smashthestack/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/wargame/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag/wifi/</loc>
<lastmod>2026-02-25T22:19:31+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/03/17/Ability-FTP-Server-2.34-STOR-Buffer-Overflow-Exploit.html</loc>
<lastmod>2013-03-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/04/11/Bison-FTP-Server-v3.5-MKD-Buffer-Overflow-Exploit.html</loc>
<lastmod>2013-04-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/04/12/Hackademic-RTB-1-Walkthrough.html</loc>
<lastmod>2013-04-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/04/14/Hackademic-RTB-2-Walkthrough.html</loc>
<lastmod>2013-04-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/04/19/Vulnimage-Walkthrough.html</loc>
<lastmod>2013-04-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/04/25/McAfee-Hacme-v1.0-Walkthrough.html</loc>
<lastmod>2013-04-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/wifi/2013/05/10/Cracking-WEP-WPA2-PSK-Wireless-Encryption.html</loc>
<lastmod>2013-05-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/06/08/HoneyNet-Project-Forensics-Challenge-2010-Walkthrough.html</loc>
<lastmod>2013-06-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/06/16/CySCA-2013-Network-Forensic-Question-Writeup.html</loc>
<lastmod>2013-06-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/08/15/Manual-ARP-Spoofing.html</loc>
<lastmod>2013-08-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/08/17/Worldmail-IMAPD-3.0-SEH-LIST-Buffer-Overflow.html</loc>
<lastmod>2013-08-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/08/22/CySCA-2013-Memory-Forensic-Writeup.html</loc>
<lastmod>2013-08-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/08/22/Ultra-Mini-HTTPD-GET-Request-Stack-Buffer-Overflow.html</loc>
<lastmod>2013-08-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/09/11/Smashthestack-IO-Walkthrough.html</loc>
<lastmod>2013-09-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/09/24/CSAW-CTF-2013-Qualification-Round-Writeup.html</loc>
<lastmod>2013-09-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/09/29/K17-CTF-2013-Reverse-Engineering-Challenges-Writeup.html</loc>
<lastmod>2013-09-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/10/03/OverTheWire-Vortex-Level-0-Writeup.html</loc>
<lastmod>2013-10-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/10/25/Hack.lu-2013-CTF-Roboauth-Reverse-Engineering-Writeup.html</loc>
<lastmod>2013-10-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/11/08/OverTheWire-Bandit-Levels-0-25-Writeup.html</loc>
<lastmod>2013-11-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2013/11/18/OverTheWire-Narnia-Levels0-4-Writeup.html</loc>
<lastmod>2013-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2014/02/05/OverTheWire-Natas-Levels-0-25-Writeup.html</loc>
<lastmod>2014-02-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2014/02/10/Minalic-Webserver-v2.0.0-Buffer-Overflow-Exploit.html</loc>
<lastmod>2014-02-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2014/02/10/Sami-FTP-Server-2.0.2-Buffer-Overflow-Exploit.html</loc>
<lastmod>2014-02-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2014/04/22/BigAnt-Server-v2.50-Buffer-Overflow-Exploit.html</loc>
<lastmod>2014-04-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2014/04/22/Intrasrv-Simple-Web-Server-v1.0-Host-Remote-Buffer-Overflow-Exploit.html</loc>
<lastmod>2014-04-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2014/04/30/OverTheWire-Krypton-Levels-0-5-Writeup.html</loc>
<lastmod>2014-04-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2014/07/11/Exploiting-MySQL-With-User-Defined-Functions-and-SETUID-Binaries.html</loc>
<lastmod>2014-07-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2014/09/22/CSAW-CTF-Qual-2014-csaw2013reversing2.exe-Writeup.html</loc>
<lastmod>2014-09-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2015/10/18/OverTheWire-Behemoth-Levels-0-8-Walkthrough.html</loc>
<lastmod>2015-10-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2015/10/18/OverTheWire-Leviathan-Levels-0-7-Walkthrough.html</loc>
<lastmod>2015-10-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2015/11/14/TIS-100-Review.html</loc>
<lastmod>2015-11-14T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2016/05/26/Shearwater-AusCert-2016-CTF-Game-of-Memory-Writeup.html</loc>
<lastmod>2016-05-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2016/05/26/Shearwater-AusCert-2016-CTF-Sheldon-Writeup.html</loc>
<lastmod>2016-05-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2016/05/26/Shearwater-AusCert-2016-CTF-So-You-Think-You-Can-LFI-Writeup.html</loc>
<lastmod>2016-05-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/wifi/2023/01/15/manually-extracting-the-radius-certificate-for-a-WPA2-EAP-WLAN.html</loc>
<lastmod>2023-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/wifi/2023/01/22/cracking-wep-wpa2-wireless-encryption-redux.html</loc>
<lastmod>2023-01-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/wifi/2023/02/12/cracking_psk_wlan_perimeters_with_evil_twin_attacks.html</loc>
<lastmod>2023-02-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/wifi/2023/02/12/cracking_wpa2-eap_wlan_perimeters_with_evil_twin_attacks.html</loc>
<lastmod>2023-02-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/wifi/2023/04/07/Understanding-PEAP-settings-in-windows.html</loc>
<lastmod>2023-04-07T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/wifi/2023/12/17/Building-a-WPA2-Enterprise-WLAN-with-Ubiquiti-UniFi-and-a-Microsoft-Network-Policy-Server.html</loc>
<lastmod>2023-12-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/posts/2025/02/22/Demonstrating-Threat-Actor-Thought-Process-For-Password-Cracking.html</loc>
<lastmod>2025-02-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://blog.infamoussyn.com/about.html</loc>
</url>
<url>
<loc>https://blog.infamoussyn.com/category.html</loc>
</url>
<url>
<loc>https://blog.infamoussyn.com/</loc>
</url>
<url>
<loc>https://blog.infamoussyn.com/tag.html</loc>
</url>
<url>
<loc>https://blog.infamoussyn.com/licenses/Apache-2.0.html</loc>
</url>
<url>
<loc>https://blog.infamoussyn.com/licenses/GPL-3.0.html</loc>
</url>
<url>
<loc>https://blog.infamoussyn.com/licenses/MIT.html</loc>
</url>
<url>
<loc>https://blog.infamoussyn.com/licenses/PRO.html</loc>
</url>
<url>
<loc>https://blog.infamoussyn.com/licenses/W3C-20150513.html</loc>
</url>
<url>
<loc>https://blog.infamoussyn.com/licenses/</loc>
</url>
</urlset>
