Posts
An Azure Tale of VPN, Conditional Access and MFA Bypass
Assessing Standalone Managed Service Accounts
DirSync: Leveraging Replication Get-Changes and Get-Changes-In-Filtered-Set
Beware of BloodHound's Contains Edge
Capitalizing on BloodHound's Data: Cypher, Object Ownerships and Trusts
WinRemoteEnum Use Cases
Non-administrative DCOM Execution: Exploring BloodHound's ExecuteDCOM
Improving My Organization’s Security Posture: A Pentester’s Guidelines