2025
From Crash to Compromise: Unlocking the Potential of Windows Crash Dumps in Offensive Security
A look into how how Windows crash dump files—often ignored in offensive operations—can be weaponized to extract sensitive data like credentials and encryption keys without noisy memory dumping techniques, while also exploring detection strategies for defenders.
Continue reading From Crash to Compromise: Unlocking the Potential of Windows Crash Dumps in Offensive Security
From Deployment to Compromise: Understanding Credential Storage in Microsoft Deployment Toolkit
A look into how Microsoft Deployment Toolkit stores credentials, how they can be obtained by a threat actor (or pentester), and what you can do to securely manage them.
Continue reading From Deployment to Compromise: Understanding Credential Storage in Microsoft Deployment Toolkit