Ways of gaining access to WPA-PSK networks.
Category: Infrastructure
Cobalt Strike
Getting started with Cobalt Strike.
Kerberos Delegation Attacks
Exploiting constrained, unconstrained and resource based delegation.
Modbus Security
Pentesting the Modbus protocol.
Kubernetes Penetration Testing
Security testing for Kubernetes clusters.
Docker Penetration Testing
Performing security audits of Docker instances.
Linux Privilege Escalation
Privilege escalation techniques for Linux hosts.
Windows Privilege Escalation
Privilege escalation techniques for Windows hosts.
Bypassing LSA Protections
LSA protections and related bypass methods.
Packet Capture with Native Tools
Capturing network traffic with pktmon and netsh.
Password Cracking
Using hashcat to reveal Windows passwords.
Certificate Based Persistence
Using AD CS certificates to achieve persistence in an Active Directory environment.