wifi-security Pivoting Over Challenge Based Enterprise WiFi Network You will discover how to connect to the organization's access point using PEAP-MSCHAPv2 authentication and relay the response to the authenticator challenge This will allow you to read the private emails on a LAN-hosted POP3 server.
wifi-security Break into the WiFi Network and Interact with Services In this post, I'll go over how to crack the key of a WEP-encrypted WiFi network and pivot into it to interact with vulnerable services running on it.
docker Interacting with Protected Docker Registry In this post, you will learn how to interact with the HTTP Basic Auth protected docker registry and cracking password with the hydra tool.