Exceeding a network switches CAM table to intercept traffic.
Relaying WebClient Connections to LDAP become a local administrator.
Using DLL’s as a persistence mechanism.
Pentesting SCCM.
Identifying users logged into a remote host.
Compromising open X Window System servers.
Encoding command line arguments to evade detection.
Maintaining access to an Active Directory environment.
A Mimikatz command reference.
Generating forged Kerberos gold, silver and diamond tickets.
A PowerView command reference.
Setting up Obfuscator LLVM with Visual Studio 2022.