Performing a Return-to-libc attack on ARM64 systems.
x64 MPROTECT ROP
Calling mprotect on x64 Linux.
MIPS32 Buffer Overflows
Exploiting memory corruption vulnerabilities on MIPS32 systems.
Command Injection
Exploiting command injection vulnerabilities.
Serial Peripheral Interfaces
Interacting with SPI to extract the contents of a ROM.
TEMPEST SDR
Intercepting signals from a HDMI monitor.
UART Connections
Interfacing with UART to gain command line access on a embedded device.
GPS Signal Spoofing
Falsifying Global Positioning System signals.
VLAN Attacks
Performing VLAN hopping attacks.
First Hop Redundancy Protocols
Exploiting VRRP & HSRP.
CAM Table Overflow Attacks
Exceeding a network switches CAM table to intercept traffic.
WebClient Privilege Escalation
Relaying WebClient Connections to LDAP become a local administrator.