Blog

Bypassing Credential Guard

In ye old days, a [hacker, red teamer, penetration tester, motivated child] would compromise a host, use an exploit to elevate or laterally move, and then Mimikatz their way to glory (ok, maybe not just in the old days).  This is becoming increasingly more complicated to achieve. Many new technologies have been implemented to preventContinue reading “Bypassing Credential Guard”


Follow My Blog

Get new content delivered directly to your inbox.

%d bloggers like this: