UART Connections

Interfacing with UART to gain command line access on a embedded device.

GPS Signal Spoofing

Falsifying Global Positioning System signals.

VLAN Attacks

Performing VLAN hopping attacks.

First Hop Redundancy Protocols

Exploiting VRRP & HSRP.

CAM Table Overflow Attacks

Exceeding a network switches CAM table to intercept traffic.

WebClient Privilege Escalation

Relaying WebClient Connections to LDAP become a local administrator.

DLL Proxying

Using DLL’s as a persistence mechanism.

Microsoft Configuration Manager

Pentesting SCCM.

Remote Registry Service User Enumeration

Identifying users logged into a remote host.

Pentesting X11

Compromising open X Window System servers.

Obfuscating Command Line Arguments

Encoding command line arguments to evade detection.

Active Directory Persistence

Maintaining access to an Active Directory environment.