This post is about common misconfigurations and attack szenarios that enable an attacker to access separated networks with critical systems or sensitive data...| s3cur3th1ssh1t.github.io