• Back

Resources

ManyKatz: How Active Directory Hacks Went Mainstream

A Hacker's Favorite Tool
Understand how attackers cover their tracks
Active Directory and authentication protocols like NTLM and Kerberos are pillars of modern enterprise IT. They’re also under attack. The story of how identity infrastructure attacks went from “Jedi” to “Just another Day at the Office” is 30 years in the making.

You will learn:

The origins of a hacking tool used by 28 advanced persistent threat (APT) groups
How your organization's identity infrastructure is vulnerable to persistent attacks
Strategies for exposing stealthy identity attacks and establishing "ground truth" in your IT environment.

Related Resources

Card image cap
Managed Assurance Data Sheet

Published Jan 12, 2022

Card image cap
MDR Data Sheet

Published Jan 12, 2022

Card image cap
Identity Assurance Data Sheet

Published Jan 12, 2022

Card image cap
Professional Services Data Sheet

Published Jan 12, 2022