Exploiting dynamic DNS updates.
A look at various open source C2 agents.
Exploiting common Android vulnerabilities.
Bypassing Android certificate pinning using Objection.
Identifying common security issues in mobile applications.
Exploiting common Webmin vulnerabilities.
Performing VLAN hopping attacks.
Exploiting VRRP & HSRP.
Exceeding a network switches CAM table to intercept traffic.
Relaying WebClient Connections to LDAP become a local administrator.
Pentesting SCCM.
Identifying users logged into a remote host.