Interfacing with UART to gain command line access on a embedded device.
GPS Signal Spoofing
Falsifying Global Positioning System signals.
VLAN Attacks
Performing VLAN hopping attacks.
First Hop Redundancy Protocols
Exploiting VRRP & HSRP.
CAM Table Overflow Attacks
Exceeding a network switches CAM table to intercept traffic.
WebClient Privilege Escalation
Relaying WebClient Connections to LDAP become a local administrator.
DLL Proxying
Using DLL’s as a persistence mechanism.
Microsoft Configuration Manager
Pentesting SCCM.
Remote Registry Service User Enumeration
Identifying users logged into a remote host.
Pentesting X11
Compromising open X Window System servers.
Obfuscating Command Line Arguments
Encoding command line arguments to evade detection.
Active Directory Persistence
Maintaining access to an Active Directory environment.