Red Teaming

Shadow Credentials Attack

To begin with, this post explores the exploitation technique known as the Shadow Credentials attack. This attack leverages the mismanagement or exploitation of Active Directory

DACL Attacks

Abusing AD-DACL: AddSelf

This post explores AddSelf Active Directory abuse, a common misconfiguration involving Discretionary Access Control Lists (DACL). Specifically, by exploiting the AddSelf permission, attackers can escalate