- Joined
- Apr 23, 2026
- Messages
- 102
- Reaction score
- 155
This series consists of 6 articles:
1. Theory
2. Classic Attacks
3. Unconstrained Delegation
4. Constrained Delegation
5. Resource-Constrained Delegation
6. PKINIT
In this series of articles, I will attempt to understand the theoretical structure of the Kerberos protocol and the attacks that can be carried out in practice against Active Directory.
I will also provide some recommendations for countering the attacks under consideration.