Active Directory Attack Scenarios Part 3: Deserializing Your Way In | Core Security Blog