Performing VLAN hopping attacks.
First Hop Redundancy Protocols
Exploiting VRRP & HSRP.
CAM Table Overflow Attacks
Exceeding a network switches CAM table to intercept traffic.
WebClient Privilege Escalation
Relaying WebClient Connections to LDAP become a local administrator.
DLL Proxying
Using DLL’s as a persistence mechanism.
Microsoft Configuration Manager
Pentesting SCCM.
Remote Registry Service User Enumeration
Identifying users logged into a remote host.
Pentesting X11
Compromising open X Window System servers.
Obfuscating Command Line Arguments
Encoding command line arguments to evade detection.
Active Directory Persistence
Maintaining access to an Active Directory environment.
Mimikatz
A Mimikatz command reference.
Forged Kerberos Tickets
Generating forged Kerberos gold, silver and diamond tickets.