Description

  • Understand about various ways to enumerate ways to gain access across the forest trust.

  • Understand about sIDHistory, Trust Keys and leverage the same to move across the forest.

  • Understand how delegation based attacks can be leverages to escalate privileges across the forest.

  • Learn about ways to enumerate SQL Servers and leverage the DBLinks to move laterally across the forest.

  • Understand about Foreign Security Principals and ways to abuse the same to move across the forest.

  • Learn and Execute SID Filtering bypass.

  • Enumerate abusable ACLs and abuse the same to move across the forest.

  • Understand about PAM trust.

Last updated