6.5. 参考链接¶
6.5.1. Windows¶
6.5.1.1. 域渗透¶
Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques <http://download.microsoft.com/download/7/7/A/77ABC5BD-8320-41AF-863C-6ECFB10CB4B9/Mitigating%20Pass-the-Hash%20(PtH)%20Attacks%20and%20Other%20Credential%20Theft%20Techniques_English.pdf>`_
QOMPLX Knowledge: Fundamentals of Active Directory Trust Relationships
DCShadow explained: A technical deep dive into the latest AD attack technique
adsec An introduction to Active Directory security