Manual Kerberos for Penetration Testers

Broker

Moderator
Staff member
Moderator
Exclusive
Infinity
Premium
Member
Joined
Apr 23, 2026
Messages
102
Reaction score
155
🔎 Kerberos for Penetration Testers

This series consists of 6 articles:
1. Theory
2. Classic Attacks
3. Unconstrained Delegation
4. Constrained Delegation
5. Resource-Constrained Delegation
6. PKINIT

In this series of articles, I will attempt to understand the theoretical structure of the Kerberos protocol and the attacks that can be carried out in practice against Active Directory.

I will also provide some recommendations for countering the attacks under consideration.
 
2,491Threads
28,560Messages
4,598Members
ihhie44943Latest member
Top Bottom