Ways of gaining access to WPA-PSK networks.
Getting started with Cobalt Strike.
Exploiting constrained, unconstrained and resource based delegation.
Security testing for Kubernetes clusters.
Performing security audits of Docker instances.
Privilege escalation techniques for Linux hosts.
Privilege escalation techniques for Windows hosts.
LSA protections and related bypass methods.
Capturing network traffic with pktmon and netsh.