Strap in – We’re about to hack the future
Howdy Hackers! I hope you all are doing great!
As we dive into 2025, I’m thrilled to introduce you to the Upcoming Blog Series here at CrocHub. This marks the first “Chronicles” post rather than a technical one, and I’m keeping it casual to give you a sneak peek of what’s in store. My goal? To help you decide if the content I’m planning is worth your time (spoiler: it is 😁).
I’m dedicated to sharing valuable content with a writing style that’s so engaging and relatable that you’ll keep coming back for more. I want to create something you genuinely look forward to reading, and I promise you that it’s mostly going to be really practical hands-on stuff, along with the thought process behind every step, and some bad jokes (you’ve been warned lol).
Without further ado, let’s dive into what’s coming your way!
CrocHub – What to Expect?
Following are the topics on which I will be starting a blog series:
1) Active Directory Hacking
Active Directory (AD) is a hacker’s playground—and for good reason.
Over 90% of the Fortune 1000 companies use AD in their IT infrastructure. That statistic alone highlights it’s importance when we talk about exploiting and assessing the security posture of an organization.
In this blog series, I will walk you through each and every attack possible in the GOAD(Game of Active Directory) lab. From the lab setup to exploitation and mitigations, I am here at your service!
This series will serve as a cornerstone for this blog & your ultimate war manual for AD battlefield. So, gear up and be excited!
2) Wifi Hacking
Wi-Fi networks are everywhere—and so are their vulnerabilities. From Coffee shops to enterprise setups, poorly configured wireless networks can be a hacker’s goldmine and a nightmare for the sysadmin.
As part of this series, we’ll set up a home wifi hacking lab and perform all the common wifi-related attacks while also learning the steps to secure and mitigate these vulnerabilities.
3) HTB/THM Writeups
Occasionally, I do plan on doing some detailed writeups of HackTheBox & TryHackme challenges. These will include all the necessary steps from boot to root while my key focus is going to be on the thought process behind every step. I’ll try to add as much context and details as possible which will help you learn how to think like a hacker.(Tho I am also still learning that😉)
I’ll be doing more of AD or Windows based boxes because that’s my strongest side.
4) Cheat Sheets
Cheat sheets are lifesavers, whether you’re on a real-life engagement or tackling a live exam. These can help you stay organized, streamline your workflow and avoid overlooking critical steps. I do plan on creating extensive cheat sheets on stuff like enumeration, privilege escalation, or what I feel like is beneficial.
Before ending up, I would like to share about my journey and my upcoming goals briefly.
From /dev/null to here
Backstory
My journey in cybersecurity began in the most unexpected way—after watching a Bollywood movie. The film tho was based on unrealistic simulations, it ignited a spark in me! It outlined the bad impact those malicious guys can have in our society, and more importantly, it fueled a deep curiosity to learn more about hacking so that I can contribute to make the online world a better place. As a result, I dived right in!
First Steps
It was the start of 2023; I started tinkering around & watching different videos on YouTube about the career pathway and all that kinda stuff. I learned that Linux is essential for an ethical hacker, and this was the first time I was introduced to the term “virtualization“. I installed Kali Linux in a VM(Virtual Machine) and started watching tutorials on how to use it.
To strengthen my foundation, I enrolled in courses for Python and Bash scripting. While I managed to complete them, I realized that a lack of consistent practice caused much of the knowledge to fade over time. Recognizing this gap, I plan to revisit and redo these courses to ensure a deeper and more lasting understanding.
Starting from there, one day I came across the 2023 roadmap for an ethical hacker by The Cyber Mentor@TCM Security, which gave me a clear pathway of where to go. However, it has an updated version for 2025 published recently which you can see below:
PNPT
As I got to TCM Security, I heard about their most famous cert, the PNPT(Practical Network Penetration Tester). I started preparing for it at the start of 2024. The first course I started doing was the PEH(Practical Ethical Hacking) course. But I realized that my networking skills weren’t up to the mark so I left that over there and went to do a networking course from YouTube. I did the CCNA course from networkchuck though there are a hell lot of other options available as well.
With my networking skills improved, I went back to working on my goal of getting the PNPT certification. After months of hard work and focus, I was able to achieve it in November 2024—something I couldn’t have done without the help and blessings of ALLAH.
I’ll be sharing a detailed review of the exam, packed with tips and resources to help you pass on your first attempt. Stay tuned!
Feel free to explore the About page to learn more about me!
croc, What’s next?
I have set several goals for 2025, and inshALLAH, I am determined to achieve them:
G1: Projects
I plan to work on some projects that solve real world pentesting challenges and streamline the pentester’s workflow.
G2: Being a Cyber Mentor
Knowledge shared is knowledge multiplied. Hence, I aim to become a cyber mentor and give back to the community. Feel free to DM me on Discord if you need help with anything. My username is, you all know, @croclius.
G3: Repeat, Repeat & Repeat
Repetition is the foundation of mastery in cybersecurity. I plan on revisiting my notes and practicing stuff back and forth until it becomes second nature.
Final Thoughts
I am determined to provide you with as much value as possible and look forward to your strong support on this journey. Thanks for checking out my blog!
–Croc