• Back

Resources

ManyKatz: How Active Directory Hacks Went Mainstream

A Hacker's Favorite Tool
Understand how attackers cover their tracks
Active Directory and authentication protocols like NTLM and Kerberos are pillars of modern enterprise IT. They’re also under attack. The story of how identity infrastructure attacks went from “Jedi” to “Just another Day at the Office” is 30 years in the making.

You will learn:

The origins of a hacking tool used by 28 advanced persistent threat (APT) groups
How your organization's identity infrastructure is vulnerable to persistent attacks
Strategies for exposing stealthy identity attacks and establishing "ground truth" in your IT environment.

Related Resources

Card image cap
Offensive Security Service Data Sheet

Published Sep 28, 2021

Card image cap
Offensive Security Service Tech Spec

Published Sep 28, 2021

Card image cap
Punkspider Data Sheet

Published Jul 20, 2021

Card image cap
Intelligent Due Diligence Tech Spec

Published Jul 15, 2021