Skip to content

Files

Latest commit

 

History

History
12 lines (10 loc) · 538 Bytes

File metadata and controls

12 lines (10 loc) · 538 Bytes
coverY
0

Description

  • Understand about Kerberos authentication.
  • Enumerate the domain environment and explore avenues to escalates the privileges.
  • Learn about Kerberoasting attack and OPSEC considerations for performing Kerberoasting attack.
  • Understand about gMSA and learn to generate the gMSA password offline with appropriate privileges.
  • Learn, understand and abuse delegation based configurations available in Active Directory environment.
  • Explore options to abuse misconfigured ACLs for escalating privileges.