andreafortuna.org
Abusing Group Policy Preference files for password discovery | So Long, and Thanks for All the Fish
How attackers can exploit Group Policy Preferences file in order to discover passwords? And how SysAdmins can mitigate this vulnerability?