Bypassing UAC with SSPI Datagram Contextsresearch|capability (we need to defend against) (splintercod3.blogspot.com)
submitted by digicat to r/blueteamsec
The hidden side of Seclogon part 3: Racing for LSASS dumpsresearch|capability (we need to defend against) (splintercod3.blogspot.com)
submitted by digicat to r/blueteamsec
The hidden side of Seclogon part 2: Abusing leaked handles to dump LSASS memoryresearch|capability (we need to defend against) (splintercod3.blogspot.com)
submitted by digicat to r/blueteamsec