Security testing for Kubernetes clusters.
Performing security audits of Docker instances.
Privilege escalation techniques for Linux hosts.
Privilege escalation techniques for Windows hosts.
LSA protections and related bypass methods.
Capturing network traffic with pktmon and netsh.
Stealing credentials using Quick Creds.
Using hashcat to reveal Windows passwords.
Using AD CS certificates to achieve persistence in an Active Directory environment.
Extracting NTLM hashes without the need for Mimikatz.
A review of the Evasion Techniques and Breaching Defences course by Offensive Security.
Performing NTLM relay attacks using SMB and LDAP.