πŸ–ŠοΈ Author: Nairuz Abulhul

🌐 Blog: R3dbuck3t

Table of Contents

Constrained Delegation Overview

<aside> πŸ“Œ Constrained delegation allows an application to impersonate a user or computer account to access specific allowed service on behalf of the authenticated user.

</aside>

Steps to abuse constrained delegation assigned to a user /computer account

πŸ› οΈ Tools

Finding Delegation Accounts