Author: Raj

Red Teaming

Shadow Credentials Attack

To begin with, this post explores the exploitation technique known as the Shadow Credentials attack. This attack leverages the mismanagement or exploitation of Active Directory