
Red TeamMicrosoft
Kerberos Delegation Explained For Hackers By Hackers
In this article, the core concepts of Kerberos delegation will be described, followed by an analysis of Kerberos delegation and unconstrained delegation.
November 13, 2023
Initializing security protocols...
Explore 2 articles related to Lateral Movement

In this article, the core concepts of Kerberos delegation will be described, followed by an analysis of Kerberos delegation and unconstrained delegation.

Lateral movement is a stage in which the attacker tries to deepen his grip by moving to other devices in the network. In this article we will show how to move between different machines, devices or assets in the network, in order to attack its targets.