Skip to content

Latest commit

 

History

History
18 lines (13 loc) · 550 Bytes

File metadata and controls

18 lines (13 loc) · 550 Bytes
description
If you have compromised a user account or a computer (machine account) that has kerberos constrained delegation enabled, it's possible to impersonate any domain user (including administrator)

Kerberos Constrained Delegation

Prerequisites- Hunting for user accounts that have kerberos constrained delegation enabled:

Get-NetUser -TrustedToAuth

Reference

{% embed url="https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-kerberos-constrained-delegation" %}