Dean Was Here
  • About Me
  • 📣TALKS
    • Zero Knowledge VM Hijinks
      • Page
      • ZK Execution Environments
      • ZK Execution Environments 2
      • ZK VM Hijinks
    • Rolodex
    • Web3 Hacking
      • They Put Money on the Internet!
      • Close Encounters of the Third Web
      • Blockchains and Privacy
      • That Toorcamp Web3 thing
    • DIY Black Badge
    • NSA Playset
      • NSA Playset : Intro
      • NSA Playset : GSM
    • CheapBugs
    • Platypus
    • Hashbounty
    • Breaking Same-Origin
    • Lateral Movement in Linux Environments
    • WiMAX Hacking
    • Seeds of Contempt
    • LibOMG
    • Pickupline
  • 🛠️PROJECTS
    • Bastet.ai
    • ZK Bounty
    • NWeb
      • Masspull
      • Scan Token
    • ponzi.finance
    • Birdfeeder
    • ETH Hax
    • Webmine
    • BTC Now
    • BTC Pipe
    • BTC Lotto
    • CrackMyWallet
    • Kaginawa
    • Crypto.me
    • ddrp.io
    • cors.io
Powered by GitBook
On this page
  1. TALKS

Rolodex

mapping the human attack surface

PreviousZK VM HijinksNextWeb3 Hacking

Last updated 1 year ago

This talk was given at Toorcamp in 2022. It covered a full attack flow and end to end methodology, from recon to dumping the domain controller, for identity oriented hacking. This was the culmination of the two years I spent doing third party penetration testing and red team engagements, and was delivered right before jumping back into the web3 space.

Code:

Video: Video exists, but I can't find it right now. If you want to see it, bug me and I'll probabally be able to find it later :-D

📣
https://github.com/pierce403/rolodex