coverY |
---|
0 |
- Understand about Kerberos authentication.
- Enumerate the domain environment and explore avenues to escalates the privileges.
- Learn about Kerberoasting attack and OPSEC considerations for performing Kerberoasting attack.
- Understand about gMSA and learn to generate the gMSA password offline with appropriate privileges.
- Learn, understand and abuse delegation based configurations available in Active Directory environment.
- Explore options to abuse misconfigured ACLs for escalating privileges.