Take Over Situations: Part 2 – Zerologon
This blog post will walk through utilizing publicly available exploit code to compromise a network through Zerologon.
This blog post will walk through utilizing publicly available exploit code to compromise a network through Zerologon.
In this blog series, we will be performing a walkthrough of interesting domain takeovers that have occurred during pentest engagements. The first part of this series occurred rather recently during […]