You may also enjoy
Unconstrained Delegation Attack on Active Directory
2 minute read
How to exploit the misconfigured Active Directory permissions on delegation.
Setting up Jekyll on AWS S3 - Part 2
1 minute read
Preparing you development environment
Token Impersonation
2 minute read
How to exploit the misconfigured
Setting up Jekyll on AWS S3 - Part 1
1 minute read
Creating your S3 bucket to host Jekyll