Elad Shamir
See the latest by Elad Shamir
Is Kerberoasting Still a Risk When AES-256 Kerberos Encryption Is Enabled?
TL;DR Kerberoasting is fundamentally a weak password problem. Stronger encryption slows down cracking, but it doesn’t...
By: Elad Shamir
Oct 21, 2025 • 4 min read
Read Post
The Renaissance of NTLM Relay Attacks: Everything You Need to Know
NTLM relay attacks have been around for a long time. While many security practitioners think NTLM...
By: Elad Shamir
Apr 8, 2025 • 40 min read
Read Post
Navigating the Uncharted: A Framework for Attack Path Discovery
This is the second post in a series on Identity-Driven Offensive Tradecraft, which is also the...
By: Elad Shamir
Aug 20, 2024 • 8 min read
Read Post
The Security Principle Every Attacker Needs to Follow
Earlier this year, I was tasked with developing a follow-on course for our renowned Adversary Tactics:...
By: Elad Shamir
Jul 17, 2024 • 12 min read
Read Post
At the Edge of Tier Zero: The Curious Case of the RODC
The read-only Domain Controller (RODC) is a solution that Microsoft introduced for physical locations that don’t...
By: Elad Shamir
Jan 25, 2023 • 19 min read
Read Post
Shadow Credentials: Abusing Key Trust Account Mapping for Account Takeover