Skip to main content

Section outline

    • Investigating Active Directory Attacks:
      • Pass the Hash, Mimikatz Credential Dumping, Kerberos Attacks
      • Golden Tickets, NTDS.DIT Theft, BloodHound Analysis
    • Endpoint Threat Hunting Techniques:
      • Event ID Analysis & Threat Indicators
      • Sysmon for Threat Hunting & Windows Process Analysis
      • Hunting Macros, Mimikatz, and Remote Threads