Have you ever wondered about the alerts you receive, what they mean, how it looks from an attacker’s point of view, or how to determine true positives vs. false positives? Join one of our principal security analysts, Dylan Black, where he demonstrates common attacks against organizations.
Introduction to Attack Simulation
Episode 1: Credential Dumping via Registry Hives
Episode 2: Overpass the Hash
Episode 3: Kerberoasting
Episode 4: UAC Bypass
Episode 5: Utilman Bypass
Episode 6: SMB Persistence via Autorun
You Might Want to Skip Our Booth at Black Hat This Year