Top Categories

Spotlight

todayJanuary 2, 2024

Red Teaming + Social Engineering krptyk

Reverse Proxy Phishing With Evilginx

Reverse proxy phishing with Evilginx is a technique where a phishing site acts as a proxy server, intercepting legitimate requests and forwarding them to the genuine website while capturing sensitive information from users. This approach allows us to create convincing phishing campaigns by seamlessly proxying the target site, making it [...]


krptyk

13 Results / Page 1 of 2

Background

todayJanuary 2, 2024

close

Red Teaming + Social Engineering krptyk

Reverse Proxy Phishing With Evilginx

Reverse proxy phishing with Evilginx is a technique where a phishing site acts as a proxy server, intercepting legitimate requests and forwarding them to the genuine website while capturing sensitive information from users. This approach allows us to create convincing phishing campaigns by seamlessly proxying the target site, making it ...

todayOctober 28, 2023

  • 1
close

Penetration Testing + Cyber security + Red Teaming krptyk

Behind the Chrome Vault: A Guide to Stealing Cookies

This post is a continuation on the chrome decryption series. Previously I walked through how we can exfiltrate and decrypt the login data (credentials) from a users chrome browser. While capturing login data is a treasure trove of info, there’s another dimension to this exploration: cookies. Cookies, those seemingly innocuous ...

todayOctober 22, 2023

close

Red Teaming + Penetration Testing krptyk

Under the EDRadar: ADExplorer on Red Teams

Active Directory (AD) is the heart of many corporate networks, and as a penetration tester, understanding how to navigate and manipulate it is essential. In this guide, we will explore the powerful tool ADExplorer and uncover its various applications for offensive purposes. ADExplorer is part of Mark Russinovich’s Sysinternals suite, ...

todaySeptember 20, 2023

close

Cyber security + Penetration Testing krptyk

Encrypting Shellcode to Evade AV

Bypassing antivirus (AV) detection is a constant challenge for ethical hackers and penetration testers. One effective technique used by attackers is the encryption or obfuscation of malicious shellcode. In this blog post, we will explore a Go (Golang) program that encrypts shellcode, making it more difficult for AV software to ...