Android vs. The Terminator

We had a little bit of downtime and played a CTF at Kernelcon 24. Did pretty well and started writing up some of the challenges. This is one pertaining to Android.…

Practical Physical Exploitation Course Review

"The Practical Physical Exploitation course is well worth the time, money, and effort. The instructors have built an excellent offering that is a true 'zero to hero' style course that not only new pentesters, but seasoned professionals would both gain value from attending."…

SE: Build a Caller ID Spoofing Rig

Telephone Caller ID (CID) is often abused to manipulate the recipient's trust. Come explore the technology as STACKTITAN's Alex Sander's demonstrates building a CID spoofing rig.…

Hardware-Hacking: Lifting Firmware

Join us as we explore a technique to lift firmware from hardware. This is the first of many hardware hacking topics that the STACKTITAN team will be sharing and hope that it inspires you to crack open and investigate that perfectly functional router on your desk.…

SMBExec: Red Side Analysis (Part 2)

STACKTITAN's Alex Mason is back with part II in this tradecraft series. This time around he demonstrates modifying SMBExec to bypass various detections.…