Description
Understand about various ways to enumerate ways to gain access across the forest trust.
Understand about sIDHistory, Trust Keys and leverage the same to move across the forest.
Understand how delegation based attacks can be leverages to escalate privileges across the forest.
Learn about ways to enumerate SQL Servers and leverage the DBLinks to move laterally across the forest.
Understand about Foreign Security Principals and ways to abuse the same to move across the forest.
Learn and Execute SID Filtering bypass.
Enumerate abusable ACLs and abuse the same to move across the forest.
Understand about PAM trust.
Last updated