by Hocine Mahtout
04 November 2022
The goal of this blog post is to present a privilege escalation I found while working on ADCS. We will...
by Sergio Lazaro
18 May 2022
The abuse of constrained delegation configuration, whereby a compromised domain user or computer account configured with constrained delegation can be...