Attivo Networks Blogs

Vulnerability Assessment

Skeleton Key Vulnerability Assessment

Reading Time: 2 minutes  |  Published: May 27, 2021 in Blogs, Vulnerability Assessment

Written by: Vikram Navali, Senior Technical Product Manager - Once an attacker has gained domain admin rights to your Active Directory, there are several techniques they can use and maintain persistence within the Windows environment. One such technique is Modify Authentication Process, where adversaries may...