How to extract credentials from Windows systems using built in commands.
An overview of Kerbroasting to extract service account credentials.
A demonstraton of named pipe communication using Meterpreter.
How to take advantage of the NetSessionEnum API to determine remotely logged in users.
A demonstration of how BloodHound can be used to exploit Active Directory based networks.
Configuring Active Directory honey tokens to detect account enumeration.
A guide to configure a Linux system as a WPA2 Enterprise wireless access point using an Alpha wireless adapter.
Configuring YubiKey two factor authenticaton for interactive login to a Windows domain.