File tree Expand file tree Collapse file tree 1 file changed +3
-0
lines changed Expand file tree Collapse file tree 1 file changed +3
-0
lines changed Original file line number Diff line number Diff line change @@ -16,6 +16,9 @@ https://www.cyberark.com/threat-research-blog/the-big-zbang-theory-a-new-open-so
16
16
4. ** RiskySPNs scan** - discovers risky configuration of SPNs that might lead to credential theft of Domain Admins
17
17
5. ** Mystique scan** - discovers risky Kerberos delegation configuration in the network.
18
18
19
+ For your convenience, there is also a summarized Data Sheet about zBang:
20
+ https://github.com/cyberark/zBang/blob/master/zBang%20Summarized%20Data%20Sheet.pdf
21
+
19
22
# Execution Requirements
20
23
1. Run it with any domain user. The scans do not require any extra privileges; the tool performs read-only LDAP queries to the DC.
21
24
2. Run the tool from a domain joined machine (a Windows machine).
You can’t perform that action at this time.
0 commit comments