最后更新于4年前
这有帮助吗?
A collection of techniques that exploit and abuse Active Directory, Kerberos authentication, Domain Controllers and similar matters.
Here are the articles in this section: