Offensive Security
This is a featured category, which have their own page. Check out _featured_tags/example.md
to learn how to create your own.

From Deployment to Compromise: Understanding Credential Storage in Microsoft Deployment Toolkit
A look into how Microsoft Deployment Toolkit stores credentials, how they can be obtained by a threat actor (or pentester), and what you can do to securely manage them.
Continue reading From Deployment to Compromise: Understanding Credential Storage in Microsoft Deployment Toolkit