Our Blog

Constrained Delegation Considerations for Lateral Movement

Reading time: ~17 min
The abuse of constrained delegation configuration, whereby a compromised domain user or computer account configured with constrained delegation can be...