PinnedAdam ToscherA Red Team Guide for a Hardware Penetration TestPart 2: Using security risks from the Modern Open Web Application Security Project to help hack hardware4 min read·Jan 23, 2021----
Adam ToscherWireless Penetration TipsA list for all things wireless that you may find useful while assessing a real world Wi-Fi Enterprise Network. How-to: c, KARMA, MANA…5 min read·Mar 10, 2020----
Adam ToscherWireless Penetration Testing -KaliThis post will talk about what USB devices are supported out of the box for Kali in the year 2020, include a quick cheat sheet, and and…2 min read·Dec 29, 2019----
Adam ToscherNew Hot Spot 2.0 Wifi Evil Twin AttackIn this new wireless attack, I’ll walk you through the process of creating a Hot Spot 2.0 Evil Twin. This is potentially another attack…4 min read·Nov 26, 2019----
Adam ToscherA Red Team Guide for a Hardware Penetration Test: Part 1When looking at different routing and networking technology it’s easy to be overwhelmed, with how to assess an embedded device. I like…3 min read·Sep 30, 2019----
Adam ToscherHow to create an EVIL LTE TwinBe very careful when playing with any cellular bands. Denial of service attacks can have devastating and sometimes jail worthy…5 min read·Jun 5, 2019----
Adam ToscherHow to obtain Office 365 credentials on Mac OSIn this article we’ll discuss how to get clear text credentials from Outlook 2016 using Responder on Mac OS High Sierra. From password…2 min read·Apr 22, 2019----
Adam ToscherPassword Spraying- Common mistakes and how to avoid themWhen password spraying attacks are executed properly, coordinated and scoped properly during an authorized engagement — they can identify…4 min read·Apr 17, 2019----
Adam ToscherTop 5 Ways The Red Team breached and assessed the Physical EnvironmentWe tailgate, skim and clone. Social engineer and deceived to employee and CISO alike, to get onsite and hit our “Breach” Physical, or…5 min read·Mar 6, 2019----
Adam ToscherNew attack on WPA/WPA2 using PMKIDIn this short blog, I will walk you through the process of obtaining a valid PMKID packet, and converting those frames of data to hashcat…4 min read·Aug 6, 2018----