Skeleton Key Vulnerability Assessment

Written by: Vikram Navali, Senior Technical Product Manager – Once an attacker has gained domain admin rights to your Active Directory, there are several techniques they can use and maintain persistence within the Windows environment. One such technique is Modify Authentication Process, where adversaries may modify the standard authentication process on a Domain Controller (DC).