Have You Looked in the Trash? Unearthing Privilege Escalations from the Active Directory Recycle Bin
How overlooked objects in AD's Recycle Bin can become a goldmine for attackers—and what defenders need to know

How overlooked objects in AD's Recycle Bin can become a goldmine for attackers—and what defenders need to know
Strategies to minimize logging generation, and methods to enhance logging efficiency
Discover how to exploit the certifried vulnerability easily with bloodyAD.
Take full control of the Kerberos protocol on Active Directory using bloodyAD.
Leverage certificate-based authentication power on Active Directory environment.