VLAN Attacks

Performing VLAN hopping attacks.

First Hop Redundancy Protocols

Exploiting VRRP & HSRP.

CAM Table Overflow Attacks

Exceeding a network switches CAM table to intercept traffic.

WebClient Privilege Escalation

Relaying WebClient Connections to LDAP become a local administrator.

Microsoft Configuration Manager

Pentesting SCCM.

Remote Registry Service User Enumeration

Identifying users logged into a remote host.

Pentesting X11

Compromising open X Window System servers.

Obfuscating Command Line Arguments

Encoding command line arguments to evade detection.

Active Directory Persistence

Maintaining access to an Active Directory environment.

Forged Kerberos Tickets

Generating forged Kerberos gold, silver and diamond tickets.

Active Directory Schema Modification

Changing default security descriptor properties to escalate from a child to parent domain.

Exploiting Tomcat

Exploiting common Tomcat vulnerabilities.