Kerberoasting, exploiting unpatched systems – a day in the life of a Red Teamer
In Summary : Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to either use the...
https://updatesinfosec.blogspot.com/2018/05/kerberoasting-exploiting-unpatched.html
In Summary :
Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to either use the hardened laptop of the client or to try and connect our own laptop to the network (though they did have a Network Access Control system in place). This blog posts lists out our attempts to overcome the security controls, escalate our privileges, and move through the network, while at the same time ensuring that the SOC does not pick up our activities [...]
kindly refer the following link as follow up :
https://ift.tt/2IzPPgM

Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to either use the hardened laptop of the client or to try and connect our own laptop to the network (though they did have a Network Access Control system in place). This blog posts lists out our attempts to overcome the security controls, escalate our privileges, and move through the network, while at the same time ensuring that the SOC does not pick up our activities [...]
kindly refer the following link as follow up :
https://ift.tt/2IzPPgM
