Using their own weapons for defense - A SharePoint story
Jul 23, 2025
·
BloodyShell
·
7 mins read
Exploring our adventure while building detection for SharePoint exploitation and vulnerability.
Exploring our adventure while building detection for SharePoint exploitation and vulnerability.
Exploring the so called NT ANONYMOUS_LOGON user through HTTP endpoints