Kerberos Constrained Delegation
This lab explores a security impact of unrestricted kerberos delegation enabled on a domain computer.
User Account
Prerequisites
Get-NetUser -TrustedToAuth


Execution






Computer Account




References
PreviousKerberos Unconstrained DelegationNextKerberos Resource-based Constrained Delegation: Computer Object Takeover
Last updated