❌

Normal view

Abusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation

By: BHIS
26 November 2025 at 15:00

This is the third in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven't already, feel free to read the first blog post, as they discuss the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem, and how to abuse unconstrained delegation.

The post Abusing Delegation with Impacket (Part 3): Resource-Based Constrained Delegation appeared first on Black Hills Information Security, Inc..

Abusing Delegation with Impacket (Part 2): Constrained Delegation

By: BHIS
12 November 2025 at 15:00

This is the second in a three-part series of blog posts discussing how to abuse Kerberos delegation! If you haven't already, feel free to read the first blog post, as it discusses the Kerberos authentication process and how delegation plays an important role in solving the double-hop problem.

The post Abusing Delegation with Impacket (Part 2): Constrained Delegation appeared first on Black Hills Information Security, Inc..

Abusing Delegation with Impacket (Part 1): Unconstrained Delegation

By: BHIS
5 November 2025 at 15:00

In Active Directory exploitation, Kerberos delegation is easily among my top favorite vectors of abuse, and in the years I’ve been learning Kerberos exploitation, I’ve noticed that Impacket doesn’t get nearly as much coverage as tools like Rubeus or Mimikatz.

The post Abusing Delegation with Impacket (Part 1): Unconstrained Delegation appeared first on Black Hills Information Security, Inc..

Impacket Cheatsheet

By: BHIS
6 August 2025 at 17:00

Impacket is an extremely useful tool for post exploitation. It is a collection of Python scripts that provides low-level programmatic access to the packets and for some protocols, such as DCOM, Kerberos, SMB1, and MSRPC, the protocol implementation itself.

The post Impacket Cheatsheet appeared first on Black Hills Information Security, Inc..

AS-REP Roasting

20 February 2024 at 08:25
Active Directory users that have the Kerberos pre-authentication enabled and require access to a resource initiate the Kerberos authentication process by sending an Authentication Server…

Continue reading β†’ AS-REP Roasting

Domain Escalation – Backup Operator

22 January 2024 at 08:15
The Backup Operators is a Windows built-in group. Users which are part of this group have permissions to perform backup and restore operations. More specifically,…

Continue reading β†’ Domain Escalation – BackupΒ Operator

❌