Niklas Heringer
Niklas Heringer
Cybersecurity & Math.
⌘K
  • Home
  • About me
  • Blog
  • #Socials
  • GitHub
  • Instagram
  • TikTok
  • Medium
  • #My Work
  • Penetration Testing
  • Skills Lab
  • Research
  • Digital Forensics
  • Security News
  • Field Notes
  • Prospero
  • Picks
  • #Info and Guidance
  • Privacy Policy and Cookie Policy
  • Impressum
Subscribe Sign in
Niklas Heringer

Penetration Testing

In-depth guides and articles on ethical hacking and vulnerability assessment.
How to Proceed after the User Flag: My Beginner’s Priv Esc Flow
privilege-escalation

How to Proceed after the User Flag: My Beginner’s Priv Esc Flow

Getting user.txt is just the beginning. Here’s how I hunt for privilege escalation paths on Linux boxes; what I check, how I think, and why it still stumps me sometimes.
13 May
My UnderPass Runthrough - Learnings
htb

My UnderPass Runthrough - Learnings

Cracked the UnderPass HTB box by skipping dead ends, abusing SNMP leaks, and turning mosh-server into a root shell with zero password; here is how.
10 May
An Introduction to Shells: Essentials Knowledge
shell

An Introduction to Shells: Essentials Knowledge

Understand what shells really are, how they evolved, why they matter, and how different types like reverse shells and webshells work.
29 Apr
university

Pentesting 101 – Command Injection & Shell Tricks (Session 1 – Part 2)

After exploring XSS in Part 1, we now dive into server-side command injection, shell behavior, piping, and classic reverse shell tactics.
29 Mar
Basic Introduction to Penetration Testing – some basics & reflected XSS (Session 1 - Part 1)
university-class

Basic Introduction to Penetration Testing – some basics & reflected XSS (Session 1 - Part 1)

Lab setup with Kali and Metasploitable 2, safe networking configuration, and a proper starting point for reflected XSS.
28 Mar
Niklas Heringer © 2026. Published with Ghost & Braun
  • Sign up