Credential Guard Strikes Again: The TGT Heist That Never Was!
In the world of assumed breach scenarios, red teams simulate attackers with a foothold in organizations. Using tactics like unconstrained delegation, they can snag a user’s Ticket Granting Ticket. But watch out, Credential Guard is the party pooper, blocking this tactic and others. Let’s hope your organization’s ready for its inevitable takeover!

Hot Take:
Credential Guard: The ultimate party crasher for red teams trying to have a good time with unconstrained delegation. It’s like inviting a bouncer to a hacker rave—no fun allowed! But hey, it’s for the greater good of security, right? Now, if only Credential Guard could guard my wallet from late-night online shopping sprees!
Key Points:
- Assumed breach scenarios grant red teams initial access akin to an attacker with a non-privileged domain user.
- The exercise involves creating a malicious binary to evade security controls and establish a foothold.
- Unconstrained delegation allows extraction of a user’s Ticket Granting Ticket (TGT) without needing admin privileges.
- Credential Guard blocks Kerberos Unconstrained delegation, preventing TGT extraction.
- Microsoft plans to enable Credential Guard by default in future Windows releases, encouraging its adoption for enhanced security.
Already a member? Log in here