Description

  • Understand how to leverage privileges in the domain environment to deploy persistence in the domain environment.

  • Learn about Golden, Silver and Diamond ticket usages and OPSEC considerations.

  • Understand about AdminSDHolder system container that can be leveraged for deploying persistence on Protected Groups.

  • Understand and abuse ACLs applied on the remote access protocols.

  • Understand about Skeleton Key, DSRM, Custom SSP based persistence techniques.

  • Computer and User account takeover – Shadow Credentials.

Last updated