RTO
Ctrlk
  • Getting Started
  • Command & Control
  • External Reconnaissance
  • Initial Compromise
  • Host Reconnaissance
  • Host Persistence
  • Host Privilege Escalation
  • Elevated Host Persistence
  • Credential Theft
  • Password Cracking Tips & Tricks
  • Domain Reconnaissance
  • User Impersonation
  • Lateral Movement
  • Session Passing
  • Pivoting
  • Data Protection API
  • Kerberos
    • Kerberos
    • Kerberoasting
    • ASREP Roasting
    • Unconstrained Delegation
    • Constrained Delegation
    • Alternate Service Name
    • S4U2Self Abuse
    • Resource-Based Constrained Delegation
    • Shadow Credentials
  • Active Directory Certificate Services
  • Group Policy
  • MS SQL Servers
  • Domain Dominance
  • Forest & Domain Trusts
  • Local Administrator Password Solution
  • Microsoft Defender Antivirus
  • Application Whitelisting
  • Data Hunting & Exfiltration
  • Extending Cobalt Strike
Powered by GitBook
On this page

Kerberos

KerberosKerberoastingASREP RoastingUnconstrained DelegationConstrained DelegationAlternate Service NameS4U2Self AbuseResource-Based Constrained DelegationShadow Credentials
PreviousScheduled Task CredentialsNextKerberos

Last updated 2 years ago