Unconstrained Delegation - Kerberos
Complete guide on Unconstrained Delegation in Kerberos and Active Directory, including how it works, enumeration, and exploitation techniques to compromise the domain.
14 articles
Complete guide on Unconstrained Delegation in Kerberos and Active Directory, including how it works, enumeration, and exploitation techniques to compromise the domain.
Learn to exploit the three phases of the Kerberos protocol through AS-REQroasting, AS-REProasting and Kerberoasting to obtain credentials in Active Directory environments.
Complete guide on how the Kerberos protocol works in Active Directory, explaining each step of the authentication process from KRB_AS_REQ to KRB_AP_REQ.
Learn what LocalAccountTokenFilterPolicy is in Windows, how it affects remote command execution with local administrative accounts, and how to disable it for pentesting purposes.
Detailed explanation of how NTLM authentication works in Windows, including LM and NT hashes, the Net-NTLMv2 process, and techniques like Pass The Hash.
If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.
Buy me a coffeeThanks for your support 🙏