Intercepting signals from a HDMI monitor.
Interfacing with UART to gain command line access on a embedded device.
Falsifying Global Positioning System signals.
Performing VLAN hopping attacks.
Exploiting VRRP & HSRP.
Exceeding a network switches CAM table to intercept traffic.
Relaying WebClient Connections to LDAP become a local administrator.
Using DLL’s as a persistence mechanism.
Pentesting SCCM.
Identifying users logged into a remote host.
Compromising open X Window System servers.
Encoding command line arguments to evade detection.