<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://busolj.github.io/</id><title>Echoes of Learning</title><subtitle>need to fill this up</subtitle> <updated>2025-08-26T02:18:22+00:00</updated> <author> <name>João Pedro Buso Leite</name> <uri>https://busolj.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://busolj.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://busolj.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2025 João Pedro Buso Leite </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>How I Automated Manual Data Validation Tasks with Python and Pandas</title><link href="https://busolj.github.io/posts/data-validation-with-python/" rel="alternate" type="text/html" title="How I Automated Manual Data Validation Tasks with Python and Pandas" /><published>2025-08-25T00:00:00+00:00</published> <updated>2025-08-25T00:00:00+00:00</updated> <id>https://busolj.github.io/posts/data-validation-with-python/</id> <content type="text/html" src="https://busolj.github.io/posts/data-validation-with-python/" /> <author> <name>João Pedro Buso Leite</name> </author> <category term="python" /> <summary>Disclaimer: This post focuses on the core idea and technical approach. It does not disclose sensitive details or internal processes of any institution. When working as a Vulnerability Analyst, I noticed a recurring problem: our team spent hours performing repetitive, manual data validation tasks. Every analysis required cross-checking large datasets, cleaning information, and generating repor...</summary> </entry> <entry><title>RootMe</title><link href="https://busolj.github.io/posts/thm-rootme/" rel="alternate" type="text/html" title="RootMe" /><published>2025-08-21T00:00:00+00:00</published> <updated>2025-08-21T00:00:00+00:00</updated> <id>https://busolj.github.io/posts/thm-rootme/</id> <content type="text/html" src="https://busolj.github.io/posts/thm-rootme/" /> <author> <name>João Pedro Buso Leite</name> </author> <category term="ctf" /> <category term="tryhackme" /> <summary>Hi folks, I hope you all are doing well. This CaptureTheFlag is about service misconfiguration, where it’s possible to connect into the target using FTP with the user Anonymous and use the tar command to escalate the privileges to root. To avoid this kind of situation, the SA (System Administrator) should not let services like FTP configured wrong and should take care of the sudo permission, a...</summary> </entry> <entry><title>Pickle Rick</title><link href="https://busolj.github.io/posts/thm-pickle-rick/" rel="alternate" type="text/html" title="Pickle Rick" /><published>2025-08-21T00:00:00+00:00</published> <updated>2025-08-21T00:00:00+00:00</updated> <id>https://busolj.github.io/posts/thm-pickle-rick/</id> <content type="text/html" src="https://busolj.github.io/posts/thm-pickle-rick/" /> <author> <name>João Pedro Buso Leite</name> </author> <category term="ctf" /> <category term="tryhackme" /> <summary>Hi everyone. This Capture the Flag is about a web server exploitation, focusing on reconnaissance and Linux knowledge, where the administrator let some credentials inside the source code, which allows access the web server and with help of some misconfigured Linux permissions, it’s able to escalate the privileges into root. To avoid this kind of issue, the developers and the SA (System Adminis...</summary> </entry> </feed>
