• QOMPLX Knowledge
  • Jun 4, 2021
  • By QOMPLX

QOMPLX Knowledge

QOMPLX Knowledge

Information security is complex, but it doesn’t need to be. QOMPLX Knowledge is an on-going blog series that provides vital information and insights about critical cyber security concepts, including common malicious behavior and attacks that QOMPLX analysts encounter in their customer engagements. QOMPLX Knowledge blog posts explain key information security concepts in plain language. They also explore the information security trends that drive malicious campaigns, providing useful information on threat detection and incident response.

See below for a links to articles in this ongoing series.

  1. Golden Ticket Attacks Explained
  2. Silver Ticket Attacks Explained
  3. Responding to a Golden Ticket Attack
  4. DCSync Attacks Explained
  5. DCShadow Attacks Explained
  6. Pass-the-Ticket Attacks Explained
  7. Kerberoasting Attacks Explained
  8. Responding to a Silver Ticket Attack
  9. Kerberos Delegation Attacks Explained
  10. 10 Active Directory Health Checks You Should Know
  11. NTLM Relay Attacks Explained
  12. Understanding Pass The Hash Attacks
  13. Understanding OverPass The Hash Attacks
  14. 5 Ways Attackers Bypass Microsoft Azure ATP
  15. What Are AS-REP Roasting Attacks?
  16. Detecting Lateral Movement Using Windows Event Logs
  17. 9 Reasons To Consolidate Active Directory

You might also be interested in

QOMPLX Knowledge: OverPass The Hash Attacks

QOMPLX Knowledge: OverPass The Hash Attacks

OverPass The Hash (OPtH) is a form of credential theft- and reuse attack that is one of the most common methods of lateral movement within compromised IT environments.

Read more
QOMPLX Knowledge: Skeleton Key Attack Detection

QOMPLX Knowledge: Skeleton Key Attack Detection

So-called “skeleton key” passwords are a common means of gaining administrative access to your domain controller. We talk about this common method of privilege escalation.

Read more
QOMPLX Knowledge: Detecting Pass-the-Hash Attacks

QOMPLX Knowledge: Detecting Pass-the-Hash Attacks

Pass the Hash is a common post-exploitation attack. This post discusses how QOMPLX Identity Assurance detect PtH attacks.

Read more
Request a Demo

Interested in learning more?

Subscribe today to stay informed and get regular updates from QOMPLX.