
Elad Shamir
See the latest by Elad Shamir

The Renaissance of NTLM Relay Attacks: Everything You Need to Know
NTLM relay attacks have been around for a long time. While many security practitioners think NTLM...
By: Elad Shamir
Apr 8, 2025 • 40 min read
Read Post
The Security Principle Every Attacker Needs to Follow
Earlier this year, I was tasked with developing a follow-on course for our renowned Adversary Tactics:...
By: Elad Shamir
Jul 17, 2024 • 12 min read
Read Post
At the Edge of Tier Zero: The Curious Case of the RODC
The read-only Domain Controller (RODC) is a solution that Microsoft introduced for physical locations that don’t...
By: Elad Shamir
Jan 25, 2023 • 19 min read
Read Post
Shadow Credentials: Abusing Key Trust Account Mapping for Account Takeover