A Hacker's Favorite Tool
Understand how attackers cover their tracks
Active Directory and authentication protocols like NTLM and Kerberos are pillars of modern enterprise IT. They’re also under attack. The story of how identity infrastructure attacks went from “Jedi” to “Just another Day at the Office” is 30 years in the making.
You will learn:
The origins of a hacking tool used by 28 advanced persistent threat (APT) groups
How your organization's identity infrastructure is vulnerable to persistent attacks
Strategies for exposing stealthy identity attacks and establishing "ground truth" in your IT environment.
ManyKatz: How Active Directory Hacks Went Mainstream
Related Resources

Managed Assurance Data Sheet
Published Jan 12, 2022

MDR Data Sheet
Published Jan 12, 2022

Identity Assurance Data Sheet
Published Jan 12, 2022

Professional Services Data Sheet
Published Jan 12, 2022