Posts
-
An Azure Tale of VPN, Conditional Access and MFA Bypass
-
Assessing Standalone Managed Service Accounts
-
DirSync: Leveraging Replication Get-Changes and Get-Changes-In-Filtered-Set
-
Beware of BloodHound's Contains Edge
-
Capitalizing on BloodHound's Data: Cypher, Object Ownerships and Trusts
-
WinRemoteEnum Use Cases
-
Non-administrative DCOM Execution: Exploring BloodHound's ExecuteDCOM
-
Improving My Organization’s Security Posture: A Pentester’s Guidelines