Hacker Trends

Abusing Kerberos Constrained Delegation without Protocol Transition | snovvcrash@gh-pages:~$ _

https://snovvcrash.rocks/2022/03/06/abusing-kcd-without-protocol-transition.html

https://x.com/home/status/1500785023221440512

https://x.com/home/status/1500789566772547587

https://x.com/home/status/1500796286424915969

https://x.com/home/status/1500797892679942145

https://x.com/home/status/1500803366909358081

https://x.com/home/status/1500827947485532161

https://x.com/home/status/1500849111104634882

https://x.com/home/status/1500849361667989513

https://x.com/home/status/1500850321395830787

https://x.com/home/status/1500908111976189952

https://x.com/home/status/1500910343601766411

https://x.com/home/status/1500929822859665413


Powered by @motikan2010 . Issue nomi-sec/Hacker-Trends