Analysing Network Protocols to identify vulnerabilities.
Pentesting the Modbus protocol.
Security testing for Kubernetes clusters.
Performing security audits of Docker instances.
Privilege escalation techniques for Linux hosts.
Privilege escalation techniques for Windows hosts.
LSA protections and related bypass methods.
Getting an ESP32 to work with Ubuntu and Visual Studio Code.
Capturing network traffic with pktmon and netsh.
Stealing credentials using Quick Creds.
Using hashcat to reveal Windows passwords.
Assuming other users identities by copying access tokens.