2025

From Deployment to Compromise: Understanding Credential Storage in Microsoft Deployment Toolkit
A look into how Microsoft Deployment Toolkit stores credentials, how they can be obtained by a threat actor (or pentester), and what you can do to securely manage them.
Continue reading From Deployment to Compromise: Understanding Credential Storage in Microsoft Deployment Toolkit