Description
Understand how to leverage privileges in the domain environment to deploy persistence in the domain environment.
Learn about Golden, Silver and Diamond ticket usages and OPSEC considerations.
Understand about AdminSDHolder system container that can be leveraged for deploying persistence on Protected Groups.
Understand and abuse ACLs applied on the remote access protocols.
Understand about Skeleton Key, DSRM, Custom SSP based persistence techniques.
Computer and User account takeover – Shadow Credentials.
Last updated