Daniel Mogens James McMillan
8b113752-96d8-4e0a-9a30-9e338ce189e1
2026-05-03
This certifies that the participant has successfully completed Operation Nexus Collapse, demonstrating competence across Kerberos abuse, trust exploitation, cross-domain and cross-forest attack paths, Active Directory security assessment, MSSQL exploitation, and foundational Sliver C2 operational capabilities.

The workshop validated proficiency in independently assessing the resilience of a multi-domain, multi-forest environment and achieving multi-forest compromise through exploitation of Kerberos-related misconfigurations.
Certificate Of Completion
Name
Operation Nexus Collapse
SagaLabs ApS
CVR: 44417537
Date of Issue

Distributed by:

Issued to

Daniel Mogens James McMillan

Want to report a typo or a mistake?

Credential Verification

Issue date: May 3, 2026

ID: 8b113752-96d8-4e0a-9a30-9e338ce189e1

Issued by

VERIFIED

SagaLabs

VERIFIED

At SagaLabs, we aim to create a meaningful and engaging experience for our customers. Participating in our events will challenge your business to think creatively and act in complex scenarios.

Type

Training

Level

Advanced

Format

Hybrid

Duration

10 hours

Description

This certifies that the participant has successfully completed Operation Nexus Collapse, demonstrating competence across Kerberos abuse, trust exploitation, cross-domain and cross-forest attack paths, Active Directory security assessment, MSSQL exploitation, and foundational Sliver C2 operational capabilities.

The workshop validated proficiency in independently assessing the resilience of a multi-domain, multi-forest environment and in achieving multi-forest compromise by exploiting Kerberos-related misconfigurations.

Validated Competencies

  • Proficiency in Kerberos-focused offensive techniques and supporting tooling
  • Ability to assess and exploit MSSQL database security weaknesses
  • Execution of intra‑forest and cross‑forest attack paths
  • Application of core credential-access and lateral movement methods
  • Baseline understanding of ICS architecture
  • Operational capability with Sliver C2, including Armory usage and operator alias management

Skills

Command & control

MySQL

ICS

Kerberos (Protocol)

Offensive Security

Earning Criteria

Assignment

Completed all mandatory questions