Explore >> Select a destination


You are here

aadinternals.com
| | www.cloudpartner.fi
4.2 parsecs away

Travel
| | And to the next section from SC-300 study guide, now covering: implement and manage Azure Active Directory Connect (AADC)implement and manage Azure AD Connect cloud syncimplement and manage Passwor...
| | blog.xpnsec.com
4.8 parsecs away

Travel
| | Originally presented at SOCON-2024, and continuing the series into post-exploitation techniques against Identity Providers, in this blog post we'll look at Ping, OneLogin and Entra ID. I'll discuss how post-exploitation techniques effective against Okta apply to other providers, release new tools for post-exploitation, and look at what proves to be effective when critical assets lie beyond an Identity Provider portal.
| | www.descope.com
3.3 parsecs away

Travel
| | This blog will cover an authentication implementation flaw Descope discovered in Microsoft Azure AD OAuth applications that, when exploited, could lead to full account takeover.
| | troubleshootingsql.com
25.0 parsecs away

Travel
| In the first post of this series, I had talked about the cheat sheet which documents the best practices for storage for SQL Server workloads running on Azure Virtual Machines. In this post, I am going to show how to automate additional checks for your virtual machine and your storage configuration. I am going to...