On the menu of this eighth newsletter of CERT-W, you will discover:
- an analysis of MS17-010 and ways to exploit it – including tools stolen by ShadowBrokers from the NSA;
- a study on using Kerberos delegations to compromise a Windows domain;
- an evaluation of the security of JWT tokens;
- a safety recipe methodology in an industrial environment.