Hacking the matrix, one phish at a time

nekr0ff | Cybersecurity Blog

Welcome to my Cybersecurity Blog – the internet’s corner for writeups, tips and resources of Red Teaming.

# D o n t B i t e

LAST WRITEUPS

PckleRick writeup thm
Master the Pickle Rick CTF with this guide on web enumeration and filter evasion. We cover reconnaissance using Nmap and Gobuster, techniques for bypassing command injection blacklists, and exploiting misconfigured sudo permissions to escalate privileges and root the box.
cap htb writeup
We explore IDOR vulnerabilities in web-based capture services for initial access, analyze unencrypted protocol traffic for credential harvesting, and leverage misconfigured Linux capabilities for privilege escalation.
biblioteca thm writeup
We explore open web services for initial access, leverage blind SQL injection to extract credentials for lateral movement, and exploit PYTHONPATH environment manipulation via sudo-enabled scripts for privilege escalation.

LAST TUTORIALS

hashcat tutorial
Learn Hashcat on Kali Linux: A step-by-step guide to dictionary attacks, brute-force masks, and entropy theory for professional password security auditing.
MITM attack with bettercap
Step-by-step guide to ethical Man-in-the-Middle attacks using Bettercap. Learn ARP poisoning, DNS spoofing, and how to defend your network.