«

1 comment

  1. Jakob H. Heidelberg

    I love this article, thank you Sean.

    You might also want to check out the following tool + article:
    https://github.com/CyberArkLabs/ACLight
    https://www.cyberark.com/threat-research-blog/shadow-admins-stealthy-accounts-fear/

    Best regards
    /Jakob

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>