Black Hills InfoSec - Abusing Delegation with Impacket (Part 2): Constrained Delegation

This is the second in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven't already, feel free to read the first blog post, as it discusses the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem.
The post Abusing Delegation with Impacket (Part 2): Constrained Delegation appeared first on Black Hills Information Security, Inc..
from Black Hills Information Security, Inc. https://www.blackhillsinfosec.com/abusing-delegation-with-impacket-part-2/
Comments
Post a Comment