Performing VLAN hopping attacks.
Category: Infrastructure
First Hop Redundancy Protocols
Exploiting VRRP & HSRP.
CAM Table Overflow Attacks
Exceeding a network switches CAM table to intercept traffic.
WebClient Privilege Escalation
Relaying WebClient Connections to LDAP become a local administrator.
Microsoft Configuration Manager
Pentesting SCCM.
Remote Registry Service User Enumeration
Identifying users logged into a remote host.
Pentesting X11
Compromising open X Window System servers.
Obfuscating Command Line Arguments
Encoding command line arguments to evade detection.
Active Directory Persistence
Maintaining access to an Active Directory environment.
Forged Kerberos Tickets
Generating forged Kerberos gold, silver and diamond tickets.
Active Directory Schema Modification
Changing default security descriptor properties to escalate from a child to parent domain.
Exploiting Tomcat
Exploiting common Tomcat vulnerabilities.