Hacking the matrix, one phish at a time

nekr0ff | Cybersecurity Blog

Welcome to my Cybersecurity Blog – the internet’s corner for writeups, tips and resources of Red Teaming.

# D o n t B i t e

LAST WRITEUPS

On this machine we manipulate JWT tokens abusing of the public key leaked and we escalate privileges abusing of trust on CA signed certificates.
Reset thm writeup
With this writeup we see how to use the responder to steal NTLM hashes and how to use Bloodhound to search for a privilege escalation vector.
billing thm writeup
We explore a billing web app, search for a exploit on the internet for the vulnerable software to obtain a reverse shell and abuse sudo for privilege escalation.

LAST TUTORIALS

hashcat tutorial
Learn Hashcat on Kali Linux: A step-by-step guide to dictionary attacks, brute-force masks, and entropy theory for professional password security auditing.
MITM attack with bettercap
Step-by-step guide to ethical Man-in-the-Middle attacks using Bettercap. Learn ARP poisoning, DNS spoofing, and how to defend your network.