I work as an IT analyst in Saudi Arabia. Outside work, most of my time goes into HTB, AD labs, and studying whatever I am currently weak at.
I completed CPTS in April 2026 after finishing Dante and Zephyr on HTB. Those labs changed how I approach learning. Right now I am focused on CRTP and building a stronger AD foundation.
From there I am moving into Windows internals and C/C++, then MalDev Academy, ODPC, and finally OSCP. This site is my personal notebook. I use it to track what I can actually do, not just what I have read.
I run IT for a 25-person office. That includes Active Directory, patching, endpoints, AV coverage, and first response for whatever breaks. The team is small enough that I own most of it end to end, which is how I have been learning the defensive side properly.
I ran vuln assessments and pentests against the university lab infrastructure. I found exploitable misconfigurations, wrote risk-rated reports with fix steps, and handed them back to IT. It was my first time doing this kind of work for a real environment.
I imaged and hardened lab machines, fixed day-to-day issues for students and staff, and wrote procedures for APU's internal knowledge base. It sounds basic on paper, but it is where I learned how enterprise IT actually holds together.
Where I test myself outside normal study. Longer scenarios, full attack chains, and decisions that feel closer to real environments.
My first pro lab. Big and messy. It taught me to keep clean notes because three pivots later you can lose track fast.
Pure AD. This is where Kerberoasting, ACL abuse, and cross-forest trusts stopped being theory and started making practical sense.

My journey from failing the BTL1 exam to scoring 95% on my second attempt. Learn about my preparation strategy, key mistakes, and tips for success.