Exploiting Kerberos Delegation in Active Directory in 2025

Why Kerberos Delegation Matters
Unconstrained Delegation: The Original Misconfiguration
Blue Team Notes
Constrained Delegation: The Middle Child

Blue Team Notes:
RBCD: Resource-Based Constrained Delegation
Lab Attack (Add Computer + Abuse RBCD)
Real World Labs to Practice Delegation Abuse
Unconstrained Delegation
Constrained Delegation
RBCD (Resource-Based Constrained Delegation)
Real-world red teams often combine delegation attacks with:
Defense in Layers

Conclusion
PreviousA Deep Dive into the Ransomware Timeline and Its Shadow EmpireNextExploiting Misconfigurations in Azure AWS, and GCP
Last updated
