Remove en custom-ca-private-pki
article thumbnail

Domain of Thrones: Part I

Security Boulevard

They often gained initial access through phishing or exploiting vulnerabilities, then used a combination of native and custom tools to persist within the domain with elevated credentials. However, some custom replication services in client environments use a service account to replicate credentials.

Backups 67