Abusing resource-based constrained delegation

Some notes on performing a DHCPv6 hijack & abusing resource-based constrained delegation to impersonate administrators.

Last updated