Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials.
d144ad77a37772ef7438ee197b5897733e66ad7a5604341fd7ff544e87768022