⌨️
Penetration testing & ethical hacking concepts
Ctrl
K
Copy
Windows/Active Directory
Exploitation techniques
Permission delegation
Kerberos delegation
Exploiting authentication relay ~ Print Spooler Service
Group Policy Objects (GPOs)
Exploiting Certificates
Exploiting domain trusts
Kerberoasting (TGS-REP roasting)
AS-REP roasting
Previous
RDP hijacking
Next
Permission delegation