Pentesting Azure: RECON Techniques

Even though Microsoft Azure is the second largest cloud solution after Amazon Web Services (AWS) from a market share perspective, it should be noted that approximately 95% of Forbes 500 companies use Azure. This does not mean that these companies use only Azure, or that Azure is the main cloud solution used by them, many […]

Read More →

Protecting Windows Credentials against Network Attacks

Over the years I’ve seen a lot of misconfigurations or a lack of configurations when it comes to protecting Windows credentials, hashes or Kerberos tickets. The main difficulty here comes from the fact that the Windows domain is complex and the multitude of features that it offers come with many security implications, especially when there […]

Read More →