With sufficient privileges in Active Directory, attackers only have to create an “ESX Admins” group in the targeted domain and add a user to it.

With sufficient privileges in Active Directory, attackers only have to create an “ESX Admins” group in the targeted domain and add a user to it. 

Read More  

By Xel

Let us know what you think about this article.

Verified by MonsterInsights