Exploiting command injection vulnerabilities.
Serial Peripheral Interfaces
Interacting with SPI to extract the contents of a ROM.
TEMPEST SDR
Intercepting signals from a HDMI monitor.
UART Connections
Interfacing with UART to gain command line access on a embedded device.
GPS Signal Spoofing
Falsifying Global Positioning System signals.
VLAN Attacks
Performing VLAN hopping attacks.
First Hop Redundancy Protocols
Exploiting VRRP & HSRP.
CAM Table Overflow Attacks
Exceeding a network switches CAM table to intercept traffic.
WebClient Privilege Escalation
Relaying WebClient Connections to LDAP become a local administrator.
DLL Proxying
Using DLL’s as a persistence mechanism.
Microsoft Configuration Manager
Pentesting SCCM.
Remote Registry Service User Enumeration
Identifying users logged into a remote host.