Niklas Heringer
Niklas Heringer
Cybersecurity & Math.
⌘K
  • Home
  • About me
  • Blog
  • #My Work
  • My publications
  • GitHub
  • Learning
  • Substack
  • Medium
  • #Segments
  • Penetration Testing
  • Skills Lab
  • Research
  • Digital Forensics
  • Security News
  • Field Notes
  • #Info and Guidance
  • Privacy Policy and Cookie Policy
  • Impressum
Subscribe Sign in
Niklas Heringer

Penetration Testing

In-depth guides and articles on ethical hacking and vulnerability assessment.
Introduction to File Inclusion
local-file-inclusion

Introduction to File Inclusion

An in-depth and hands-on walkthrough on spotting and exploiting Local File Inclusion (LFI); from classic payloads to modern bypasses, straight from HTB Academy labs.
24 May
From Basic to Blessed: Uplifting Your Webshell Game
webshell

From Basic to Blessed: Uplifting Your Webshell Game

From basic payloads to protected and self-destructing shells; a hands-on journey upgrading your webshells for stealth, power, and style.
23 May
SQLi Hands-On: Injecting Chaos
sql-injection

SQLi Hands-On: Injecting Chaos

A practical deep dive into SQL Injection in DVWA; from simple payloads to reading and writing files, fuzzing with ffuf, and scripting attacks in Burp Suite.
16 May
How to Proceed after the User Flag: My Beginner’s Priv Esc Flow
privilege-escalation

How to Proceed after the User Flag: My Beginner’s Priv Esc Flow

Getting user.txt is just the beginning. Here’s how I hunt for privilege escalation paths on Linux boxes; what I check, how I think, and why it still stumps me sometimes.
13 May
My UnderPass Runthrough - Learnings
htb

My UnderPass Runthrough - Learnings

Cracked the UnderPass HTB box by skipping dead ends, abusing SNMP leaks, and turning mosh-server into a root shell with zero password; here is how.
10 May
An Introduction to Shells: Essentials Knowledge
shell

An Introduction to Shells: Essentials Knowledge

Understand what shells really are, how they evolved, why they matter, and how different types like reverse shells and webshells work.
29 Apr
university

Pentesting 101 – Command Injection & Shell Tricks (Session 1 – Part 2)

After exploring XSS in Part 1, we now dive into server-side command injection, shell behavior, piping, and classic reverse shell tactics.
29 Mar
Basic Introduction to Penetration Testing – some basics & reflected XSS (Session 1 - Part 1)
university-class

Basic Introduction to Penetration Testing – some basics & reflected XSS (Session 1 - Part 1)

Lab setup with Kali and Metasploitable 2, safe networking configuration, and a proper starting point for reflected XSS.
28 Mar
Niklas Heringer © 2026. Published with Ghost & Braun
  • Sign up
Privacy settings niklas-heringer.com

This website uses strictly necessary cookies and optional cookies for newsletter tracking. Learn more in our Privacy Policy.

Manage cookies
Strictly necessary Required

Required for the website to function. Includes session cookies, security features, and Stripe fraud-prevention cookies (active only during payment flows). Cannot be disabled.

Newsletter & marketing

Enables tracking of newsletter opens and clicks to deliver more relevant content.