Questions

  1. Explain how AS-REP roasting works and list two detections.
  2. Outline a reliable Kerberoasting chain from SPN discovery to lateral movement.
  3. Describe RBCD abuse requirements and mitigation controls.
  4. Compare Golden vs Silver tickets and detection strategies.
  5. Propose a domain takeover chain combining at least three techniques.