Testing IPv6 security.
Category: Infrastructure
Bypassing Multi Factor Authentication
Intercepting multi factor authentication credentials using an Nginx reverse proxy.
Phishing
Sending Phishing emails to capture login credentials.
Terraform
Using Terraform to deploy testing infrastructure & auditing Terraform configuration files.
802.11 Wireless Attacks
Ways of gaining access to WPA-PSK networks.
Cobalt Strike
Getting started with Cobalt Strike.
Kerberos Delegation Attacks
Exploiting constrained, unconstrained and resource based delegation.
Modbus Security
Pentesting the Modbus protocol.
Kubernetes Penetration Testing
Security testing for Kubernetes clusters.
Docker Penetration Testing
Performing security audits of Docker instances.
Linux Privilege Escalation
Privilege escalation techniques for Linux hosts.
Windows Privilege Escalation
Privilege escalation techniques for Windows hosts.