Many Active Directory attacks’ root vulnerability is the domain’s AD Access Control Lists. This post explains what you need to know about the AD Access Control List to prevent lateral movement and escalation of privileges in the domain.
How you can leverage built-in Windows OS tools to bypass Two-Factor Authentication. Bypass Yubikeys and Duo 2FA! Red Team TTPs!