Analysing Network Protocols to identify vulnerabilities.
Modbus Security
Pentesting the Modbus protocol.
Kubernetes Penetration Testing
Security testing for Kubernetes clusters.
Docker Penetration Testing
Performing security audits of Docker instances.
Linux Privilege Escalation
Privilege escalation techniques for Linux hosts.
Windows Privilege Escalation
Privilege escalation techniques for Windows hosts.
Bypassing LSA Protections
LSA protections and related bypass methods.
Configuring an ESP32 in Ubuntu 22.04
Getting an ESP32 to work with Ubuntu and Visual Studio Code.
Packet Capture with Native Tools
Capturing network traffic with pktmon and netsh.
Getting Started with Bash Bunny
Stealing credentials using Quick Creds.
Password Cracking
Using hashcat to reveal Windows passwords.
Access Token Manipulation
Assuming other users identities by copying access tokens.