Wireless Attacks, Packet Injections, Reversing Firmware,Router Service Exploitation and Pentesting
Analyzing Malware, Trojans and Viruses