Attacking Kerberos Deployments
Understanding the Windows SMB NTLM Weak Nonce Vulnerability
Adventures in Limited User Post Exploitation
Standing on the Shoulders of the Blue Monster: Hardening Windows Applications
Ushering in the Post-GRC World: Applied Threat Modeling
New Threats to Privacy: From TIA to Google
Unauthorized Internet Wiretapping: Exploiting Lawful Intercept
The DMCA & ACTA vs. Academic & Professional Research: How Misuse of this Intellectual Property Legislation Chills Research, Disclosure and Innovation
Attacking Phone Privacy
Carmen Sandiego is On the Run!