Module 3 Assessment
Validate your understanding of advanced AD attacks
Questions
- Explain how AS-REP roasting works and list two detections.
- Outline a reliable Kerberoasting chain from SPN discovery to lateral movement.
- Describe RBCD abuse requirements and mitigation controls.
- Compare Golden vs Silver tickets and detection strategies.
- Propose a domain takeover chain combining at least three techniques.