Exploiting Enterprise Backup Software For Privilege Escalation: Part Two

https://northwave-cybersecurity.com/exploiting-enterprise-backup-software-for-privilege-escalation-part-two