Phishing

Sending Phishing emails to capture login credentials.

Terraform

Using Terraform to deploy testing infrastructure & auditing Terraform configuration files.

802.11 Wireless Attacks

Ways of gaining access to WPA-PSK networks.

Cobalt Strike

Getting started with Cobalt Strike.

Kerberos Delegation Attacks

Exploiting constrained, unconstrained and resource based delegation.

Kubernetes Penetration Testing

Security testing for Kubernetes clusters.

Docker Penetration Testing

Performing security audits of Docker instances.

Linux Privilege Escalation

Privilege escalation techniques for Linux hosts.

Windows Privilege Escalation

Privilege escalation techniques for Windows hosts.

Bypassing LSA Protections

LSA protections and related bypass methods.

Packet Capture with Native Tools

Capturing network traffic with pktmon and netsh.

Password Cracking

Using hashcat to reveal Windows passwords.