ARM64 ROP Chaining

Performing a Return-to-libc attack on ARM64 systems.

x64 MPROTECT ROP

Calling mprotect on x64 Linux.

MIPS32 Buffer Overflows

Exploiting memory corruption vulnerabilities on MIPS32 systems.

Command Injection

Exploiting command injection vulnerabilities.

Serial Peripheral Interfaces

Interacting with SPI to extract the contents of a ROM.

TEMPEST SDR

Intercepting signals from a HDMI monitor.

UART Connections

Interfacing with UART to gain command line access on a embedded device.

GPS Signal Spoofing

Falsifying Global Positioning System signals.

VLAN Attacks

Performing VLAN hopping attacks.

First Hop Redundancy Protocols

Exploiting VRRP & HSRP.

CAM Table Overflow Attacks

Exceeding a network switches CAM table to intercept traffic.

WebClient Privilege Escalation

Relaying WebClient Connections to LDAP become a local administrator.