Page cover image

Description

  • Understand about Kerberos authentication.

  • Enumerate the domain environment and explore avenues to escalates the privileges.

  • Learn about Kerberoasting attack and OPSEC considerations for performing Kerberoasting attack.

  • Understand about gMSA and learn to generate the gMSA password offline with appropriate privileges.

  • Learn, understand and abuse delegation based configurations available in Active Directory environment.

  • Explore options to abuse misconfigured ACLs for escalating privileges.

Last updated