Alice in Windowsland: 3 ways to escalate privileges and steal credentials
Read how our red team used different attack techniques to hack AppLocker restrictions by implementing escalated privileges and reusing the Credentials Manager to extract stored data and Azure information.