Intercepting multi factor authentication credentials using an Nginx reverse proxy.
Phishing
Sending Phishing emails to capture login credentials.
Terraform
Using Terraform to deploy testing infrastructure & auditing Terraform configuration files.
Keystroke Logging
Logging Keystrokes with SetWindowHookEx.
Process Mitigation Policies & ACG
Attempting to use binary signature policies and arbitrary code guard to bypass userland hooks.
Parent Process ID Spoofing
Supplying arbitrary PPID values to CreateProcess.
File Upload Vulnerabilities
Exploiting file upload vulnerabilities to execute arbitrary code.
SQL Injection
SQL Injection for MySQL databases.
XML External Entity Injection (XXE)
Exploiting XML parsers.
Web Content Discovery
Identifying web content to launch further attacks.
Cross Site Scripting (XSS)
Injecting malicious code into web applications.
Shellcode Obfuscation
Encoding Shellcode for use within malware.