# References

* [https://book.hacktricks.xyz/](https://book.hacktricks.xyz/windows/active-directory-methodology/acl-persistence-abuse)
* <https://beta.hackndo.com/>
* <https://www.ired.team/>
* [https://casvancooten.com/](https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/#powershell-amsi-bypass)
* [https://www.guidepointsecurity.com](https://www.guidepointsecurity.com/blog/delegating-like-a-boss-abusing-kerberos-delegation-in-active-directory/)
* [https://www.cyberark.com/](https://www.cyberark.com/resources/threat-research-blog/weakness-within-kerberos-delegation)
* <https://attack.stealthbits.com/>
* <https://attack.stealthbits.com/>
* <https://www.thehacker.recipes>/
* <https://www.hackingarticles.in/active-directory-enumeration-rpcclient/>
* <https://bitvijays.github.io/LFF-IPS-P3-Exploitation.html>
* <https://medium.com/@Shorty420/enumerating-ad-98e0821c4c78>
