Blog
Getting Inside the Mind of an Attacker: After the Breach – Miscellaneous Techniques for Achieving Persistence
By Julio Sanchez on Tue, 08/31/2021
In the first two parts of this series, we covered how attackers may attempt to gain persistence in Active Directory by forging Kerberos tickets or through domain replication abuse, and also discussed strategies to detect these methods. In this part, we’ll touch on a few more techniques: AdminSDHolder and SDProp abuse, SID History attacks, and skeleton key attacks.
AdminSDHolder Container and...