This is just like any other security blog maintaining my notes on configurations, approaches, attack /defense techniques, etc during pentesting.