<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://ozyns.github.io//</id><title>ozyns</title><subtitle></subtitle> <updated>2026-05-05T19:30:58+00:00</updated> <author> <name>ozyns</name> <uri>https://ozyns.github.io//</uri> </author><link rel="self" type="application/atom+xml" href="https://ozyns.github.io//feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://ozyns.github.io//"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 ozyns </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Red Team vs Blue Team — Part 1: Building the Lab</title><link href="https://ozyns.github.io//posts/redteam-blueteam-part1/" rel="alternate" type="text/html" title="Red Team vs Blue Team — Part 1: Building the Lab" /><published>2026-02-21T00:00:00+00:00</published> <updated>2026-05-05T19:30:35+00:00</updated> <id>https://ozyns.github.io//posts/redteam-blueteam-part1/</id> <content type="text/html" src="https://ozyns.github.io//posts/redteam-blueteam-part1/" /> <author> <name>ozyns</name> </author> <category term="Cybersecurity" /> <category term="Penetration Testing" /> <summary>⚠︎ Disclaimer: This project was conducted in a fully isolated virtual lab for academic purposes only. All techniques described are strictly educational and were performed in a controlled environment with no real systems involved. Series Overview This is Part 1 of a 4-part series documenting a full Red Team vs Blue Team exercise built from scratch. Part Topic ...</summary> </entry> <entry><title>My First Full Penetration Test</title><link href="https://ozyns.github.io//posts/pentest-metasploitable2/" rel="alternate" type="text/html" title="My First Full Penetration Test" /><published>2025-11-27T00:00:00+00:00</published> <updated>2026-05-03T00:34:26+00:00</updated> <id>https://ozyns.github.io//posts/pentest-metasploitable2/</id> <content type="text/html" src="https://ozyns.github.io//posts/pentest-metasploitable2/" /> <author> <name>ozyns</name> </author> <category term="Cybersecurity" /> <category term="Penetration Testing" /> <summary>⚠︎ Disclaimer: This project was conducted entirely in an isolated virtual lab for academic purposes. All techniques shown here are strictly educational. Never attempt these on systems you don’t own or have explicit written permission to test. What is a Penetration Test? A penetration test (or “pentest”) is a simulated cyberattack on a system, performed with permission, to find security wea...</summary> </entry> <entry><title>Evil Twin Attack with Fluxion</title><link href="https://ozyns.github.io//posts/evil-twin-attack/" rel="alternate" type="text/html" title="Evil Twin Attack with Fluxion" /><published>2025-11-09T00:00:00+00:00</published> <updated>2026-05-03T00:34:41+00:00</updated> <id>https://ozyns.github.io//posts/evil-twin-attack/</id> <content type="text/html" src="https://ozyns.github.io//posts/evil-twin-attack/" /> <author> <name>ozyns</name> </author> <category term="Cybersecurity" /> <category term="Penetration Testing" /> <summary>⚠︎ Disclaimer: This writeup is strictly for educational purposes. Performing this attack without explicit written permission from the network owner is illegal. Always test in a controlled lab environment. What is Fluxion? Fluxion is a wireless security auditing tool used in penetration testing. Instead of brute-forcing a Wi-Fi password, it takes a smarter approach, it uses social engineeri...</summary> </entry> <entry><title>Nmap Commands Guide — Essential Scanning Techniques</title><link href="https://ozyns.github.io//posts/nmap-commands-guide/" rel="alternate" type="text/html" title="Nmap Commands Guide — Essential Scanning Techniques" /><published>2025-10-17T00:00:00+00:00</published> <updated>2025-10-17T00:00:00+00:00</updated> <id>https://ozyns.github.io//posts/nmap-commands-guide/</id> <content type="text/html" src="https://ozyns.github.io//posts/nmap-commands-guide/" /> <author> <name>ozyns</name> </author> <category term="Cybersecurity" /> <category term="Networking" /> <summary>Nmap is one of the most powerful tools in a cybersecurity professional’s arsenal. This guide covers essential Nmap commands with practical explanations of what each one does and when to use it. nmap -Pn -p &amp;lt;port&amp;gt; Used to scan a target’s ports directly, skipping host discovery. Nmap will not check whether the host is “up” — it assumes it is and proceeds straight to port scanning. U...</summary> </entry> <entry><title>EUR/USD Forecasting with Random Forest — A Machine Learning Approach</title><link href="https://ozyns.github.io//posts/eurusd-random-forest/" rel="alternate" type="text/html" title="EUR/USD Forecasting with Random Forest — A Machine Learning Approach" /><published>2025-05-02T00:00:00+00:00</published> <updated>2026-05-02T10:02:20+00:00</updated> <id>https://ozyns.github.io//posts/eurusd-random-forest/</id> <content type="text/html" src="https://ozyns.github.io//posts/eurusd-random-forest/" /> <author> <name>ozyns</name> </author> <category term="Machine Learning" /> <category term="Finance" /> <summary>TL;DR — Raw price data alone isn’t useful. We engineered 36 features (returns, volatility, RSI, lag windows), used a proper time-based split to avoid leakage, and trained a Random Forest reaching R² = 0.95 and 74.76% directional accuracy. Built by a team of three, each handling a key part: data, modeling, and evaluation. Motivation Forex prediction is one of the classic hard problems in ML...</summary> </entry> </feed>
