Command Injection

Exploiting command injection vulnerabilities.

Serial Peripheral Interfaces

Interacting with SPI to extract the contents of a ROM.

TEMPEST SDR

Intercepting signals from a HDMI monitor.

UART Connections

Interfacing with UART to gain command line access on a embedded device.

GPS Signal Spoofing

Falsifying Global Positioning System signals.

VLAN Attacks

Performing VLAN hopping attacks.

First Hop Redundancy Protocols

Exploiting VRRP & HSRP.

CAM Table Overflow Attacks

Exceeding a network switches CAM table to intercept traffic.

WebClient Privilege Escalation

Relaying WebClient Connections to LDAP become a local administrator.

DLL Proxying

Using DLL’s as a persistence mechanism.

Microsoft Configuration Manager

Pentesting SCCM.

Remote Registry Service User Enumeration

Identifying users logged into a remote host.