<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.fndsec.net/2026/01/13/evading-entraid-conditional-access-policies-via-cross-tenant-ropc/</loc><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2026/01/blogpost.png</image:loc><image:title>blogpost</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2026/01/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2026/01/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2026/01/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2026/01/blogpostpic.png</image:loc><image:title>blogpostpic</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2026/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-01-13T13:06:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fndsec.net/2024/10/04/uncovering-exclusion-paths-in-microsoft-defender-a-security-research-insight/</loc><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/10/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/10/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/10/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/10/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-29T13:02:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fndsec.net/2025/05/16/the-context-only-attack-surface/</loc><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/05/context-2.png</image:loc><image:title>Context (2)</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/05/image-14.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/05/cropped-context-1.png</image:loc><image:title>cropped-Context (1)</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/05/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/05/ntinject.gif</image:loc><image:title>ntinject</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/05/inject.gif</image:loc><image:title>inject</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/05/dllinject1.gif</image:loc><image:title>dllinject1</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/05/dllinject-1.gif</image:loc><image:title>dllinject</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/05/dllinject.gif</image:loc><image:title>dllinject</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/05/dllinjection.gif</image:loc><image:title>dllinjection</image:title></image:image><lastmod>2025-05-18T06:11:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fndsec.net/2023/02/23/lateral-movement-using-internet-explorer-dcom-object-and-stdregprov/</loc><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2023/02/cropped-110000189892721.jpg</image:loc><image:title>cropped-110000189892721</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2023/02/cropped-gx7ev.png</image:loc><image:title>cropped-Gx7ev</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2023/02/gx7ev.png</image:loc><image:title>Gx7ev</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2023/02/activex.webp</image:loc><image:title>activex</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2023/02/3f451-1wbwaedadmbxumafm2n383g.png</image:loc><image:title>1*WBWAedadMbXumAFm2n383g</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2023/02/f9671-1si9u9y-io8qfgmxdi4mmmq.png</image:loc><image:title>1*Si9u9y-iO8QfGmXdI4mmmQ</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2023/02/2404c-1ymniqeij3bhsx-5rlmp-2g.png</image:loc><image:title>1*yMNiqEIJ3bhsX-5rlmP-2g</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2023/02/b7d5e-1yeenp9o-8upm2wcr58lo4w.png</image:loc><image:title>1*YeeNp9O-8UPM2WcR58lO4w</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2023/02/97b9f-1ohdcn6xn7hs6gblcqwo66a.png</image:loc><image:title>1*Ohdcn6XN7Hs6GbLcQwO66A</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2023/02/7b1ac-1hz05om7kvbnvuyoopgz-1w.png</image:loc><image:title>1*HZ05om7KVBNVuyoOpgz-1w</image:title></image:image><lastmod>2025-05-15T10:18:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fndsec.net/2024/01/12/a-step-by-step-guide-to-understanding-the-tfs-vulnerability-in-the-cortex-edr/</loc><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/01/eb90a-1vypnymmbltvaotxfnuw77g.png</image:loc><image:title>1*vypNYMmBltvAoTXFnUw77g</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/01/66f28-1s0rtpvcb6rvtnm1ybq9tva.png</image:loc><image:title>1*S0RTPVcb6rvTNm1Ybq9tvA</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/01/bd084-1wtutdjogmn-aidxm0-o8uw.png</image:loc><image:title>1*WtUtDJoGmn-aIDXM0-o8Uw</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/01/e0345-1gwqvfzablf5cxrfkeanqhg.png</image:loc><image:title>1*GwqvfzABlf5CxrfkEAnqhg</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/01/0a832-1rgopv79jnhfqhli6d3qn6g.png</image:loc><image:title>1*Rgopv79JnHFqHLI6D3qN6g</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/01/a6f16-1bggob1gjanykoigze0f0pq.png</image:loc><image:title>1*bGgob1GJanYKOIgze0f0pQ</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/10/1704618101778.png</image:loc><image:title>1704618101778</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/10/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-05-15T10:17:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fndsec.net/2024/04/25/not-the-access-you-asked-for-how-azure-storage-account-read-write-permissions-can-be-abused-for-privilege-escalation-and-lateral-movement/</loc><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/04/image-12.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/04/image-8-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/04/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/04/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/04/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/04/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/04/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/04/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/04/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/04/image-6.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-05-15T10:17:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fndsec.net/2024/07/23/hook-line-and-sinker-phishing-windows-hello-for-business/</loc><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/07/00c50-1mnvwiwffrnio6tiltgfwkw.png</image:loc><image:title>1*MnvwiWFfRNIO6TILtGfWkw</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/07/97b5e-1l59lm4vj21ydn0xw_bloyw.png</image:loc><image:title>1*l59Lm4Vj21YDn0xW_BLoYw</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/07/385b6-1vvdq1a9tu20g0v4hhjz16a.png</image:loc><image:title>1*Vvdq1a9tu20G0V4hHJz16A</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/07/52609-1ywu-6j8e1cifuxuquivsvq.png</image:loc><image:title>1*ywu-6J8e1CIfuXUqUIvSVQ</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/07/5b055-1kaxwyqwemdbzferau93uza.png</image:loc><image:title>1*KAXwYQWEMdBzFeRau93uZA</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/07/d2cde-19foiwihiqjibeolyt3ytkq.png</image:loc><image:title>1*9FOiwIhIqjibeoLyT3YtkQ</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/07/49d30-1viz4zjxmyfig5d3vvbuusg.png</image:loc><image:title>1*viz4zJXmYFIg5D3VVBuUSg</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/07/43bda-1ypd3jsupuzgjo9exdnqq3a.png</image:loc><image:title>1*yPd3JSUPuZGJO9eXDnqq3A</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/07/43817-1yqxubmuk-zar2nl9er_2dq.png</image:loc><image:title>1*YQXUbMuk-ZAr2nl9ER_2dQ</image:title></image:image><lastmod>2025-05-15T10:16:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fndsec.net/2024/09/11/wmi-research-and-lateral-movement/</loc><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/09/e64a8-1laa2no5ia5gjwn1t8w1fsq.png</image:loc><image:title>1*lAA2No5iA5GJWn1t8W1fsQ</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/09/c2d55-1bdrqhftp1dapin3adbqp-w.png</image:loc><image:title>1*bdRQhFTp1dapiN3aDBqp-w</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/09/90cfa-190iapapnym8xr7izxun_sw.png</image:loc><image:title>1*90iapapNYM8xR7iZXuN_Sw</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/09/7bf0c-1erhvcmip_z8anx9de0ft4q.png</image:loc><image:title>1*eRHvcmiP_Z8aNX9de0ft4Q</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/09/597f4-1acnob3xycuhqrq5oxz0aug.png</image:loc><image:title>1*ACNob3xycUHQrq5oxz0aug</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/09/36542-1k8ldg4kzssvzuuco8comxq.png</image:loc><image:title>1*K8ldG4KZsSvZuuco8CoMXQ</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/09/16a9d-1gipyct4a9blc0ig7yistmw.png</image:loc><image:title>1*GIPYCT4a9BLc0ig7YIsTMw</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/09/115d6-13l7xcxc2ytymqyontvgzfg.png</image:loc><image:title>1*3L7xcXc2ytymqyoNtVGZfg</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/10/1_3l7xcxc2ytymqyontvgzfg.png</image:loc><image:title>1_3L7xcXc2ytymqyoNtVGZfg</image:title></image:image><lastmod>2025-05-15T10:14:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fndsec.net/2024/11/25/shadowhound/</loc><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/11/image-19.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/11/image-18.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/11/image-17.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/11/image-16.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/11/image-15.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/11/image-14.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2024/11/logo-1.png</image:loc><image:title>logo</image:title></image:image><lastmod>2025-05-15T10:12:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fndsec.net/2025/04/02/breaking-down-sharepoint-walls/</loc><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/04/sp.png</image:loc><image:title>breaking-sharepoint-walls</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/04/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/04/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/04/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.fndsec.net/wp-content/uploads/2025/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-05-15T10:11:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.fndsec.net/about/</loc><lastmod>2024-10-07T06:38:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.fndsec.net</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-01-13T13:06:35+00:00</lastmod></url></urlset>
