This post is about common misconfigurations and attack szenarios that enable an attacker to access separated networks with critical systems or sensitive data...| s3cur3th1ssh1t.github.io
In the last years my team at r-tec was confronted with many different company environments, in which we had to search for vulnerabilities and misconfiguratio...| s3cur3th1ssh1t.github.io