Description

  • Learn about various ways to extract credentials and use the same.

  • Understand various ways to gain remote access on the target machine and OPSEC considerations.

  • Abusing the ACLs to extract credentials from LAPS or generate gMSA credentials.

Last updated