[ 658 TARGETS COMPROMISED ]
Web Application Exploitation
SQL injection, XSS, CSRF, SSRF, file upload bypasses, authentication flaws, API vulnerabilities, insecure deserialization, XXE, broken access control, IDOR and command injection. Covered through the CPTS and Web Penetration Tester paths.
Active Directory Attacks
Kerberoasting, AS-REP roasting, DCSync, Pass-the-Hash, Pass-the-Ticket, GPO abuse, ACL exploitation, BloodHound enumeration, domain privilege escalation and persistence techniques. Covered through the Penetration Tester and Active Directory Enumeration paths — also trained in AD hardening and detection engineering.
Privilege Escalation
Linux: SUID/SGID binaries, kernel exploits, sudo misconfigurations, cron job abuse, writable paths and NFS shares. Windows: SeImpersonatePrivilege, unquoted service paths, DLL hijacking, registry manipulation and token impersonation.
Network & Service Exploitation
SMB, RDP, SSH, FTP, SNMP, WinRM and MSSQL exploitation. Port forwarding, proxychains, pivoting through compromised hosts, tunneling and lateral movement across segmented networks.
Reconnaissance & Enumeration
Passive and active recon using Nmap, Masscan, Gobuster, ffuf, Wfuzz, Feroxbuster, Shodan and OSINT techniques. DNS enumeration, subdomain discovery, virtual host fuzzing and certificate transparency lookups.
SOC Analysis & Threat Detection
Log analysis, SIEM monitoring with Splunk and Elastic Stack, traffic analysis with Wireshark and tcpdump, IDS/IPS rule tuning with Suricata and Snort. DFIR activities, threat hunting and incident triage. Covered through the CDSA and SOC Analyst paths.
Binary Exploitation
Buffer overflow attacks on 32-bit Windows and Linux systems, CPU architecture and register analysis, shellcode development, Python exploit scripting, and stack-based overflow techniques. Covered through the Intro to Binary Exploitation path.
Post-Exploitation & Persistence
Credential dumping with Mimikatz and secretsdump, C2 staging concepts, maintaining access via scheduled tasks and registry run keys, data exfiltration techniques and covering tracks across Windows and Linux environments.
AI / LLM Red Teaming
Prompt injection attacks, adversarial ML, LLM output manipulation, AI data pipeline exploitation, model evasion (white-box and black-box), MCP protocol vulnerabilities and AI application attacks. Covered through the AI Red Teamer path modules.
Wi-Fi Penetration Testing
WPA/WPA2 handshake capture, PMKID attacks, evil twin access points, deauthentication attacks, WPS exploitation, password cracking with Hashcat and Aircrack-ng, and targeted dictionary strategies for wireless assessments.
Malware Analysis & DFIR
Static and dynamic malware analysis, unpacking, reverse engineering with x64dbg, memory forensics with Volatility, disk imaging with FTK Imager and KAPE, Linux forensics, timeline reconstruction from MFT/USN Journal and Windows event logs.
Active Directory Hardening
Remediating common AD pentest findings, hardening default configurations, detection engineering for AD attacks, logging strategies and ongoing maintenance best practices. Covers both attacker and defender perspectives.