Table of Contents
- Introduction to Kiosk Breakout
- Decentralised Applications and Blockchain Security
- BIG-IP Remote Code Execution Vulnerability
- Policykit Exploitation
- Supply Chain Attacks: A Wordpress Case Study
- MouseJacking
- Password Cracking
- Dirty Pipe (CVE-2022-0847)
- Uber / Rockstar Hack
- ProxyNotShell in a NutShell
- Binary Exploitation Techniques
- Root Detection Bypass