Splunk protocol impersonation weak encryption simplerequest
Digital Certificates
Digital Certificates
Disable or Modify Tools, Impair Defenses
Data Destruction, File Deletion, Indicator Removal
Exploitation for Privilege Escalation, Abuse Elevation Control Mechanism, Access Token Manipulation
Permission Groups Discovery, Local Groups