Table of contents
- Overview
- Authenticating to SMB/WinRM/etc
- Kerberos login enumeration and bruteforcing
- Get Ticket granting tickets and service tickets
- Converting kirbi and ccache files
- Forging tickets
- Inspecting tickets
- Kerberoasting
- Keytab support and decrypting wireshark traffic
- Resource-based constrained delegation (RBCD)
- Unconstrained delegation