Attack Simulations

Explanation > Execution > Detection

Go Behind the Scenes

Have you ever wondered about the alerts you receive, what they mean, how it looks from an attacker’s point of view, or how to determine true positives vs. false positives? Join one of our principal security analysts, Dylan Black, where he demonstrates common attacks against organizations.

Introduction to Attack Simulation

Episode 1: Credential Dumping via Registry Hives

Episode 2: Overpass the Hash

Episode 3: Kerberoasting

Episode 4: UAC Bypass

Episode 5: Utilman Bypass

Episode 6: SMB Persistence via Autorun

Don’t Fear Risk. Manage It.

CRITICALSTART® and MOBILESOC® are federally registered trademarks owned by Critical Start. Critical Start also claims trademark rights in the following: Cyber Operations Risk & Response™ platform, and Trusted Behavior Registry®. Any unauthorized use is expressly prohibited.