Persuading Windows hosts to provide machine account credentials.
Category: Infrastructure
IPv6 Penetration Testing
Testing IPv6 security.
Bypassing Multi Factor Authentication
Intercepting multi factor authentication credentials using an Nginx reverse proxy.
Phishing
Sending Phishing emails to capture login credentials.
Terraform
Using Terraform to deploy testing infrastructure & auditing Terraform configuration files.
802.11 Wireless Attacks
Ways of gaining access to WPA-PSK networks.
Cobalt Strike
Getting started with Cobalt Strike.
Kerberos Delegation Attacks
Exploiting constrained, unconstrained and resource based delegation.
Modbus Security
Pentesting the Modbus protocol.
Kubernetes Penetration Testing
Security testing for Kubernetes clusters.
Docker Penetration Testing
Performing security audits of Docker instances.
Linux Privilege Escalation
Privilege escalation techniques for Linux hosts.