Active Directory (AD) quite literally holds the keys to the kingdom. If AD is compromised, the security of everything connected to it is compromised as well.
Watch this webinar with Adam Rosen and Alex McCoy for an in-depth look at the sophisticated tactics, techniques and procedures (TTPs) that attackers employ to compromise credentials and data.
They explain and demonstrate all key phases of the cyber kill chain, including:
- Discovery
- Lateral movement
- Privilege escalation
- Persistence
Plus, you will learn how to detect and mitigate powerful TTPs, including LDAP reconnaissance, Pass-the-Hash, password extraction from NTDS.dit and more!