At this point of the post, I assume you have set up a full environment from Part [1] post here. Today we will be covering using FuzzBunch (FB) for exploitation, and the tradecraft considerations they took in the design and what it says about the prowess of this actor.

Not too long ago the security community was rocked with yet another leak from the #ShadowBrokers[1]; causing an impact worldwide with point and click Domain Admin vulnerabilities.