We are exploiting a chain of misconfigured object permissions in Active Directory without BloodHound
Techniques used:
T1595.002
T1069.002
T1098
T1078.002
T1558.003
T1003.006
Link to the writeup here:
it is very important for me to receive feedback on my completed work. If you have noticed an error, incorrect wording in my report or simply an incorrect train of thought - please let me know in the form of feedback so that I can improve my skills in preparing reports and make them more informative and useful
Top comments (0)