Attack Simulations

Explanation > Execution > Detection

Go Behind the Scenes

Have you ever wondered about the alerts you receive, what they mean, how it looks from an attacker’s point of view, or how to determine true positives vs. false positives? Join one of our principal security analysts, Dylan Black, where he demonstrates common attacks against organizations.

Introduction to Attack Simulation

Episode 1: Credential Dumping via Registry Hives

Episode 2: Overpass the Hash

Episode 3: Kerberoasting

Episode 4: UAC Bypass

Episode 5: Utilman Bypass

Episode 6: SMB Persistence via Autorun

Benchmark your cybersecurity against peers with our Free Quick Start Risk Assessments tool!
This is default text for notification bar