We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
https://github.com/elastic/ia-trade-team/issues/276
Explore how attackers can exploit Active Directory for Credential Access using Relay, spoofing and coercion attacks.
The content you are editing has changed. Please copy your edits and refresh the page.
The text was updated successfully, but these errors were encountered:
Closing this one as completed. I explored and read a lot of things that for sure will require more cycles to explore. I'll open follow-up issues.
Sorry, something went wrong.
w0rk3r
No branches or pull requests
Parent Epic (If Applicable)
https://github.com/elastic/ia-trade-team/issues/276
Summary
Explore how attackers can exploit Active Directory for Credential Access using Relay, spoofing and coercion attacks.
Tasks
Goals
Resources:
PRs
The text was updated successfully, but these errors were encountered: