exploiting-constrained-delegation-abuse
0
Exploit Kerberos Constrained Delegation misconfigurations in Active Directory to impersonate privileged users via S4U2self and S4U2proxy extensions for lateral movement and privilege escalation.
Install this skill
Run this command in your terminal. No account required — it auto-detects your AI tool and installs the skill file.
npx @skills-hub-ai/cli install cybersecurity-skills-exploiting-constrained-delegation-abuseOr download directly:
View all CLI commands →Setup by platform
Instructions
Security
Loading security scan...