Hacking the matrix, one phish at a time

nekr0ff | Cybersecurity Blog

Welcome to my Cybersecurity Blog – the internet’s corner for writeups, tips and resources of Red Teaming.

# D o n t B i t e

LAST WRITEUPS

gavel HTB hack the box medium writeup
We exfiltrate source code to craft an advanced SQL Injection, abuse dynamic PHP functions for command execution, and manipulate YAML files for privilege escalation.
b3dr0ck THM tryhackme easy writeup
We explore unconventional SSL services for initial access, manipulate digital certificates for lateral movement, and exploit sudo configurations for privilege escalation.
publisher THM tryhackme easy writeup
Exploit Publisher on TryHackMe: A guide to PHP CMS vulnerabilities, lateral movement, and bypassing AppArmor via SUID binaries for full root access.

LAST TUTORIALS

hashcat tutorial
Learn Hashcat on Kali Linux: A step-by-step guide to dictionary attacks, brute-force masks, and entropy theory for professional password security auditing.
MITM attack with bettercap
Step-by-step guide to ethical Man-in-the-Middle attacks using Bettercap. Learn ARP poisoning, DNS spoofing, and how to defend your network.