Belette Timorée's blog post
Blog Archive
Abusing WSUS with MITM to perform ADCS ESC8 attack
Blog Archive