dMSA Abuse

Exploiting dMSA accounts to become domain administrator.

Kerberos Authentication Service Cracking

Intercepting and cracking AS-REQ & AS-REP packets.

Attacking Machine Accounts

Assuming machine account identities.

802.1X

Attacking 802.1x port authentication.

Exploiting IOS-XE

Exploiting Cisco IOS Extended Edition.

Dynamic DNS

Exploiting dynamic DNS updates.

Alternative C2 Agents

A look at various open source C2 agents.

Android Penetration Testing

Exploiting common Android vulnerabilities.

Android Certificate Pinning

Bypassing Android certificate pinning using Objection.

MobSF

Identifying common security issues in mobile applications.

Exploiting Webmin

Exploiting common Webmin vulnerabilities.

VLAN Attacks

Performing VLAN hopping attacks.