A certification holder has expertise in following skills: - Active Directory Enumeration - Abusing built-in functionality for code execution - Local Privilege Escalation - Credentials Replay - Using administration tools to compromise other machines - Bypassing countermeasures like Application White-listing and anti-virus. - Pivot through windows machines to bypass Firewall rules. - Domain Privilege Escalation using Kerberoast, Kerberos delegation, Abusing protected groups, abusing enterprise applications and more. - Domain Persistence and Dominance using Golden and Silver ticket, Skeleton key, DSRM abuse, AdminSDHolder, DCSync, ACLs abuse, host security descriptors and more. - Forest privilege escalation using cross trust attacks. - Inter-forest trust attacks - Abusing SQL Server Trusts - Lateral movement and hunting for business secrets using built-in Windows tools.