πŸ’»
0zzy-cyber
  • β˜•whoami
  • πŸͺͺCertification Reviews
    • eJPTv2
    • Certified Bug Bounty Hunter (CBBH)
    • Burp Suite Certified Practicioner (BSCP)
  • Bug Bounty
    • Synack Red Team
  • 🚩CTFs
    • TravelEndpoint: 2025
    • πŸ•ΈοΈBreach Web: HTTP Havoc 2024
    • SummitCTF 2024
    • 🎈NSA Codebreaker 2023 Writeup
    • 🏒Hack The Building 2.0 Preliminary : Hospital Edition 2023
    • πŸ”₯NSA Codebreaker 2022 Writeup
    • NCL
      • NCL Spring 2024
      • NCL Fall 2023
      • NCL Spring 2023
  • πŸ“–Research
    • Cybersecurity Capstone: Red Team Analysis of Man in the Middle Attack's Evasion Against SOC Tools
    • Cyber Capstone Part 2: The LAN Turtle
  • Hak5 Tools
    • πŸ¦†USB Rubber Ducky
    • 🐒LAN Turtle
  • Physical Security
    • πŸ”’Lockpicking
      • Toolset
    • 🦈M5StickC Plus 2
Powered by GitBook
On this page
  1. πŸ“–Research

Cyber Capstone Part 2: The LAN Turtle

In progress...

Part 2 will explore:

  • Hak5's Cloud C2 usage, other C2's

  • .1x and NAC implementation and bypass attempts

  • Larger AD environment(much like Game of Active Directory GOAD)

  • VPN setup and usage

  • Dropbox setup automation using bash

PreviousCybersecurity Capstone: Red Team Analysis of Man in the Middle Attack's Evasion Against SOC ToolsNextUSB Rubber Ducky

Last updated 3 months ago