Black Hills InfoSec - Abusing Delegation with Impacket (Part 2): Constrained Delegation

This is the second in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven't already, feel free to read the first blog post, as it discusses the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem.

The post Abusing Delegation with Impacket (Part 2): Constrained Delegation appeared first on Black Hills Information Security, Inc..



from Black Hills Information Security, Inc. https://www.blackhillsinfosec.com/abusing-delegation-with-impacket-part-2/

Comments

Popular posts from this blog

KnowBe4 - Scam Of The Week: "When Users Add Their Names to a Wall of Shame"

The Hacker News - ⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More

The Hacker News - Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets