Exploiting Kerberos Delegation in Active Directory in 2025 | Cyber Codex

Why Kerberos Delegation Matters
Unconstrained Delegation: The Original Misconfiguration
Blue Team Notes
Constrained Delegation: The Middle Child

Blue Team Notes:
RBCD: Resource-Based Constrained Delegation
Lab Attack (Add Computer + Abuse RBCD)
Real World Labs to Practice Delegation Abuse
Unconstrained Delegation
Constrained Delegation
RBCD (Resource-Based Constrained Delegation)
Real-world red teams often combine delegation attacks with:
Defense in Layers

Conclusion
PreviousUltimate Technical Breakdown of the MITRE Ecosystem | Cyber CodexNextNetwork Time Protocol (NTP) Abuse for Enterprise Recon | Cyber Codex
Last updated
Was this helpful?
