On the menu of this eighth newsletter of CERT-W, you will discover:
  • an analysis of MS17-010 and ways to exploit it – including tools stolen by ShadowBrokers from the NSA;
  • a study on using Kerberos delegations to compromise a Windows domain;
  • an evaluation of the security of JWT tokens;
  • a safety recipe methodology in an industrial environment.