Black Hills InfoSec - Abusing Delegation with Impacket: Resource-Based Constrained Delegation

This is the third in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven't already, feel free to read the first blog post, as they discuss the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem, and how to abuse unconstrained delegation.

The post Abusing Delegation with Impacket: Resource-Based Constrained Delegation appeared first on Black Hills Information Security, Inc..



from Black Hills Information Security, Inc. https://www.blackhillsinfosec.com/abusing-delegation-with-impacket-part-3/

Comments

Popular posts from this blog

KnowBe4 - Scam Of The Week: "When Users Add Their Names to a Wall of Shame"

The Hacker News - ⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More

The Hacker News - Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets