Have you ever wondered about the alerts you receive, what they mean, how it looks from an attacker’s point of view, or how to determine true positives vs. false positives? Join one of our principal security analysts, Dylan Black, where he demonstrates common attacks against organizations.
Introduction to Attack Simulation
Episode 1: Credential Dumping via Registry Hives
Episode 2: Overpass the Hash
Episode 3: Kerberoasting
Episode 4: UAC Bypass
Episode 5: Utilman Bypass
Episode 6: SMB Persistence via Autorun
5 Signs Your MDR Isn't Working - Join our March 27 webinar to spot the gaps