Infosec.Pub
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
digicatM to blueteamsecEnglish · 5 months ago

Abusing Delegation with Impacket (Part 2): Constrained Delegation

www.blackhillsinfosec.com

external-link
message-square
0
link
fedilink
1
external-link

Abusing Delegation with Impacket (Part 2): Constrained Delegation

www.blackhillsinfosec.com

digicatM to blueteamsecEnglish · 5 months ago
message-square
0
link
fedilink
Abusing Delegation with Impacket (Part 2): Constrained Delegation - Black Hills Information Security, Inc.
www.blackhillsinfosec.com
external-link
This is the second in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven't already, feel free to read the first blog post, as it discusses the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem.
alert-triangle
You must log in or # to comment.

blueteamsec

blueteamsec

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !blueteamsec@infosec.pub

For [Blue|Purple] Teams in Cyber Defence - covering discovery, detection, response, threat intelligence, malware, offensive tradecraft and tooling, deception, reverse engineering etc.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 13 users / day
  • 96 users / week
  • 311 users / month
  • 1.01K users / 6 months
  • 231 local subscribers
  • 684 subscribers
  • 3.04K Posts
  • 228 Comments
  • Modlog
  • mods:
  • digicat
  • BE: 0.19.17
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org