Abusing S4U2Self: Another Sneaky Active Directory Persistence

Get in touch

Let's explore together how Alsid can improve your products and services

Contact us

Kerberos Resource-Based Constrained Delegation: a new control path

Sun, 01/27/2019 - 17:48

This article is part of a series that explore new ways to compromise an Active Directory. The series follows an outstanding paper published by Elad Shamir: “Wagging the Dog - Abusing Resource-Based Constrained Delegation to Attack Active Directory”.

Romain Coltel
Senior Security Researcher
Former senior security auditor specialized in red-teaming missions, Romain is now tackling Active Directory problems down to the core at Alsid. During his spare time Romain is teaching the well-received SANS SEC660 in France and maintains various security software such as Dislocker or the AES-XEX and XTS modes for the famous mbedTLS library.

Get in touch

Let's explore together how Alsid can improve your products and services

Contact us