Older techniques used in a sysadmin space, weaponised for red teaming and how to detect them from a blue team perspective.
Read PostPass the X attacks originate from having a piece of information, in these examples this will be a hash, a set of credentials or a Kerberos ticket and then leveraging them for lateral movement throughout a network.
Read Post