<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 5:16 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://vandanpathak.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>RingBuffer&apos;s Blog</title>
		<link><![CDATA[https://vandanpathak.com]]></link>
		<description><![CDATA[RingBuffer&apos;s Blog]]></description>
		<lastBuildDate><![CDATA[Sun, 04 Feb 2024 23:07:24 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://vandanpathak.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://vandanpathak.com/llm-security/introduction-to-llm-vulnerabilities/]]></guid>
			<link><![CDATA[https://vandanpathak.com/llm-security/introduction-to-llm-vulnerabilities/]]></link>
			<title>Attacks on Large Language Model</title>
			<pubDate><![CDATA[Sun, 04 Feb 2024 23:07:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/]]></guid>
			<link><![CDATA[https://vandanpathak.com/]]></link>
			<title>Home &#8211; RingBuffer&#8217;s OffSec Blogs</title>
			<pubDate><![CDATA[Mon, 18 Nov 2024 03:34:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/exploiting-ad/adcs-attacking-part-3/]]></guid>
			<link><![CDATA[https://vandanpathak.com/exploiting-ad/adcs-attacking-part-3/]]></link>
			<title>Attacking AD Certificate Services &#8211; Part 3</title>
			<pubDate><![CDATA[Wed, 03 Apr 2024 06:03:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/exploiting-ad/adcs-attacking-part-2/]]></guid>
			<link><![CDATA[https://vandanpathak.com/exploiting-ad/adcs-attacking-part-2/]]></link>
			<title>Attacking AD Certificate Services &#8211; Part 2</title>
			<pubDate><![CDATA[Wed, 03 Apr 2024 06:02:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/exploiting-ad/adcs-attacking-part-1/]]></guid>
			<link><![CDATA[https://vandanpathak.com/exploiting-ad/adcs-attacking-part-1/]]></link>
			<title>Attacking AD Certificate Services &#8211;  Part 1</title>
			<pubDate><![CDATA[Wed, 03 Apr 2024 05:57:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/htb-writeups/escape-htb-struggles-and-walkthrough/]]></guid>
			<link><![CDATA[https://vandanpathak.com/htb-writeups/escape-htb-struggles-and-walkthrough/]]></link>
			<title>Escape.htb &#8211; Struggles and Walkthrough</title>
			<pubDate><![CDATA[Sun, 04 Feb 2024 23:07:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/htb-writeups/october-htb-ret2libc-writeup/]]></guid>
			<link><![CDATA[https://vandanpathak.com/htb-writeups/october-htb-ret2libc-writeup/]]></link>
			<title>October HTB &amp; ret2libc Writeup</title>
			<pubDate><![CDATA[Sat, 22 Jun 2024 04:23:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/kernels-and-buffers/buffer-overflow-exploits-demystified-from-theory-to-practice-part-2/]]></guid>
			<link><![CDATA[https://vandanpathak.com/kernels-and-buffers/buffer-overflow-exploits-demystified-from-theory-to-practice-part-2/]]></link>
			<title>Buffer Overflow Exploits Demystified: From Theory to Practice Part 2</title>
			<pubDate><![CDATA[Sat, 11 May 2024 03:29:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/kernels-and-buffers/return-oriented-programming-ret2win-rop-emporium/]]></guid>
			<link><![CDATA[https://vandanpathak.com/kernels-and-buffers/return-oriented-programming-ret2win-rop-emporium/]]></link>
			<title>ROP Challenge &#8211; Exploiting ret2win Binary</title>
			<pubDate><![CDATA[Mon, 17 Jun 2024 06:10:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/kernels-and-buffers/return-oriented-programming-split-rop-emporium/]]></guid>
			<link><![CDATA[https://vandanpathak.com/kernels-and-buffers/return-oriented-programming-split-rop-emporium/]]></link>
			<title>ROP Challenge – Exploiting Split Binary</title>
			<pubDate><![CDATA[Mon, 17 Jun 2024 06:09:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/kernels-and-buffers/return-oriented-programming-callme-rop-emporium/]]></guid>
			<link><![CDATA[https://vandanpathak.com/kernels-and-buffers/return-oriented-programming-callme-rop-emporium/]]></link>
			<title>ROP Challenge – Exploiting Callme Binary</title>
			<pubDate><![CDATA[Mon, 17 Jun 2024 06:08:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/kernels-and-buffers/rop-challenge-write4-rop-emporium/]]></guid>
			<link><![CDATA[https://vandanpathak.com/kernels-and-buffers/rop-challenge-write4-rop-emporium/]]></link>
			<title>ROP Challenge &#8211; Exploiting write4 Binary</title>
			<pubDate><![CDATA[Mon, 17 Jun 2024 04:02:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/exploiting-ad/attacking-kerberos-protocol/]]></guid>
			<link><![CDATA[https://vandanpathak.com/exploiting-ad/attacking-kerberos-protocol/]]></link>
			<title>Attacking Kerberos &#8211; Part 1</title>
			<pubDate><![CDATA[Mon, 01 Apr 2024 04:06:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/exploiting-ad/cicada-htb-writeup/]]></guid>
			<link><![CDATA[https://vandanpathak.com/exploiting-ad/cicada-htb-writeup/]]></link>
			<title>Cicada HTB Writeup</title>
			<pubDate><![CDATA[Fri, 25 Oct 2024 07:01:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/htb-writeups/buffer-overflow-and-buff-htb-writeup/]]></guid>
			<link><![CDATA[https://vandanpathak.com/htb-writeups/buffer-overflow-and-buff-htb-writeup/]]></link>
			<title>Buffer OverFlow and Buff.HTB Writeup</title>
			<pubDate><![CDATA[Mon, 01 Apr 2024 04:04:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/htb-writeups/]]></guid>
			<link><![CDATA[https://vandanpathak.com/htb-writeups/]]></link>
			<title>HTB Writeups</title>
			<pubDate><![CDATA[Fri, 28 Jun 2024 03:45:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/htb-writeups/as-rep-roasting-and-forest-htb/]]></guid>
			<link><![CDATA[https://vandanpathak.com/htb-writeups/as-rep-roasting-and-forest-htb/]]></link>
			<title>AS-REP Roasting and Forest.HTB</title>
			<pubDate><![CDATA[Mon, 18 Mar 2024 06:23:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/htb-writeups/absolute-htb-walkthrough/]]></guid>
			<link><![CDATA[https://vandanpathak.com/htb-writeups/absolute-htb-walkthrough/]]></link>
			<title>Absolute.htb Walkthrough</title>
			<pubDate><![CDATA[Mon, 18 Mar 2024 06:22:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/exploiting-ad/kerberoasting/]]></guid>
			<link><![CDATA[https://vandanpathak.com/exploiting-ad/kerberoasting/]]></link>
			<title>Attacking Kerberos &#8211; Part 2</title>
			<pubDate><![CDATA[Mon, 18 Mar 2024 06:21:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/htb-writeups/flight-htb-writeup/]]></guid>
			<link><![CDATA[https://vandanpathak.com/htb-writeups/flight-htb-writeup/]]></link>
			<title>Flight Hack The Box Writeup</title>
			<pubDate><![CDATA[Mon, 18 Mar 2024 06:20:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/htb-writeups/bagel-htb-walkthrough/]]></guid>
			<link><![CDATA[https://vandanpathak.com/htb-writeups/bagel-htb-walkthrough/]]></link>
			<title>Bagel Hack The Box Writeup</title>
			<pubDate><![CDATA[Mon, 18 Mar 2024 06:20:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/htb-writeups/support-htb-writeup-and-rbcd-attack/]]></guid>
			<link><![CDATA[https://vandanpathak.com/htb-writeups/support-htb-writeup-and-rbcd-attack/]]></link>
			<title>Support.HTB Writeup And RBCD Attack</title>
			<pubDate><![CDATA[Mon, 18 Mar 2024 06:19:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/exploiting-ad/dcsync-attack/]]></guid>
			<link><![CDATA[https://vandanpathak.com/exploiting-ad/dcsync-attack/]]></link>
			<title>DCSync  Attack</title>
			<pubDate><![CDATA[Mon, 18 Mar 2024 06:16:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/kernels-and-buffers/buffer-overflow-exploiting-easy-rm-to-mp3-converter/]]></guid>
			<link><![CDATA[https://vandanpathak.com/kernels-and-buffers/buffer-overflow-exploiting-easy-rm-to-mp3-converter/]]></link>
			<title>Buffer Overflow : Exploiting Easy RM to MP3 Converter</title>
			<pubDate><![CDATA[Mon, 01 Apr 2024 04:00:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/kernels-and-buffers/return-oriented-programming-buffer-overflow-part-1/]]></guid>
			<link><![CDATA[https://vandanpathak.com/kernels-and-buffers/return-oriented-programming-buffer-overflow-part-1/]]></link>
			<title>Return Oriented Programming &#8211; Buffer Overflow Part 1</title>
			<pubDate><![CDATA[Mon, 01 Apr 2024 04:00:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/exploiting-ad/unconstrained-delegation-attack/]]></guid>
			<link><![CDATA[https://vandanpathak.com/exploiting-ad/unconstrained-delegation-attack/]]></link>
			<title>Unconstrained Delegation Attack</title>
			<pubDate><![CDATA[Mon, 01 Apr 2024 03:51:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/blog/]]></guid>
			<link><![CDATA[https://vandanpathak.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Fri, 16 Feb 2024 04:54:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/contact/]]></guid>
			<link><![CDATA[https://vandanpathak.com/contact/]]></link>
			<title>Let&#8217;s connect</title>
			<pubDate><![CDATA[Mon, 06 Nov 2023 03:40:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://vandanpathak.com/kernels-and-buffers/buffer-overflow-exploits-demystified-from-theory-to-practice/]]></guid>
			<link><![CDATA[https://vandanpathak.com/kernels-and-buffers/buffer-overflow-exploits-demystified-from-theory-to-practice/]]></link>
			<title>Buffer Overflow Exploits Demystified: From Theory to Practice Part 1</title>
			<pubDate><![CDATA[Mon, 01 Apr 2024 04:03:33 +0000]]></pubDate>
		</item>
				</channel>
</rss>
