PinnedAdam ToscherA Red Team Guide for a Hardware Penetration TestPart 2: Using security risks from the Modern Open Web Application Security Project to help hack hardwareJan 23, 2021Jan 23, 2021
Adam ToscherWireless Penetration TipsA list for all things wireless that you may find useful while assessing a real world Wi-Fi Enterprise Network. How-to: c, KARMA, MANA…Mar 10, 2020Mar 10, 2020
Adam ToscherWireless Penetration Testing -KaliThis post will talk about what USB devices are supported out of the box for Kali in the year 2020, include a quick cheat sheet, and and…Dec 29, 2019Dec 29, 2019
Adam ToscherNew Hot Spot 2.0 Wifi Evil Twin AttackIn this new wireless attack, I’ll walk you through the process of creating a Hot Spot 2.0 Evil Twin. This is potentially another attack…Nov 26, 2019Nov 26, 2019
Adam ToscherA Red Team Guide for a Hardware Penetration Test: Part 1When looking at different routing and networking technology it’s easy to be overwhelmed, with how to assess an embedded device. I like…Sep 30, 2019Sep 30, 2019
Adam ToscherHow to create an EVIL LTE TwinBe very careful when playing with any cellular bands. Denial of service attacks can have devastating and sometimes jail worthy…Jun 5, 2019Jun 5, 2019
Adam ToscherHow to obtain Office 365 credentials on Mac OSIn this article we’ll discuss how to get clear text credentials from Outlook 2016 using Responder on Mac OS High Sierra. From password…Apr 22, 2019Apr 22, 2019
Adam ToscherPassword Spraying- Common mistakes and how to avoid themWhen password spraying attacks are executed properly, coordinated and scoped properly during an authorized engagement — they can identify…Apr 17, 2019Apr 17, 2019
Adam ToscherTop 5 Ways The Red Team breached and assessed the Physical EnvironmentWe tailgate, skim and clone. Social engineer and deceived to employee and CISO alike, to get onsite and hit our “Breach” Physical, or…Mar 6, 2019Mar 6, 2019
Adam ToscherNew attack on WPA/WPA2 using PMKIDIn this short blog, I will walk you through the process of obtaining a valid PMKID packet, and converting those frames of data to hashcat…Aug 6, 2018Aug 6, 2018