Using Local LLM’s to perform NMap scans.
Exploiting PowerShell JEA configurations.
Exploiting dMSA accounts to become domain administrator.
Intercepting and cracking AS-REQ & AS-REP packets.
Assuming machine account identities.
Attacking 802.1x port authentication.
Exploiting Cisco IOS Extended Edition.
Exploiting dynamic DNS updates.
A look at various open source C2 agents.
Exploiting common Android vulnerabilities.
Bypassing Android certificate pinning using Objection.
Identifying common security issues in mobile applications.