todaySeptember 20, 2023| krptyk.com
Reverse proxy phishing with Evilginx is a technique where a phishing site acts as a proxy server, intercepting legitimate requests and forwarding them to the genuine website while capturing sensitive information from users. This approach allows us to create convincing phishing campaigns by seamlessly proxying the target site, making it [...]| Krptyk
Remote debugging is a powerful feature that allows developers to connect to a running browser instance and control it externally. This capability, however, can be turned into a potent tool in the hands of a red team aiming to probe the defenses of a target organization. What is remote debugging? [...]| Krptyk
This post is a continuation on the chrome cookie theft series. Previously I walked through how we can exfiltrate and decrypt the cookies from a users chromium browser. But what if the user is currently using their browser? If this is the case then we can’t just copy and paste [...]| Krptyk
This post is a continuation on the chrome decryption series. Previously I walked through how we can exfiltrate and decrypt the login data (credentials) from a users chrome browser. While capturing login data is a treasure trove of info, there’s another dimension to this exploration: cookies. Cookies, those seemingly innocuous [...]| Krptyk
Active Directory (AD) is the heart of many corporate networks, and as a penetration tester, understanding how to navigate and manipulate it is essential. In this guide, we will explore the powerful tool ADExplorer and uncover its various applications for offensive purposes. ADExplorer is part of Mark Russinovich’s Sysinternals suite, [...]| Krptyk
The tastic RFID thief was created nearly ten years ago, and it only seemed fitting to bring this up again since, well, it still works today. Why does it still work? Well, replacing an entire buildings access control systems is extremely expensive so outdated technology is left since theoretically it [...]| Krptyk
Recently, someone approached me with a predicament: they had forgotten the password to an essential Excel document and wondered if there was any way to recover the data or the document’s password.In this case, there is indeed a solution, provided the password isn’t an ultra-secure combination of 16 characters, comprising [...]| Krptyk
Bypassing antivirus (AV) detection is a constant challenge for ethical hackers and penetration testers. One effective technique used by attackers is the encryption or obfuscation of malicious shellcode. In this blog post, we will explore a Go (Golang) program that encrypts shellcode, making it more difficult for AV software to [...]| Krptyk
In today’s blog post, we are going to explore the creation and functioning of a dynamic shellcode loader tailored for Windows. This loader is instrumental in bypassing specific security measures in Windows environments. Before we dive in, it is crucial to note that this tutorial is for educational purposes only and should be utilized responsibly – I take no responsibility for how you use this code. Before I receive questions regarding this, at the time of posting this is able to bypass Wi...| Krptyk
todayOctober 21, 2023| krptyk.com
For many, Google Chrome is not just a browser but an essential tool used daily. From saving passwords to preserving cookies for easy site navigation, Chrome does a lot in the background to enhance a users browsing experience. However, have you ever wondered where all this data is stored and how it’s protected? This guide unravels the secrets of Chrome’s encrypted storage, presenting a step-by-step approach to decrypt and access this information. | Krptyk