- Published on
Guest logon enumeration was used to discover an LDAP querying application that was reverse-engineered to find encrypted credentials that allowed for more enumeration that leads to LDAP eunumeration to discover more credentials for user access. Bloodhound shows an attack vector having access with an ACE of GenericAll over a computer account that leads to Resource-Based Constrained Delegation that grants SYSTEM access