A Hacker's Favorite Tool
Understand how attackers cover their tracks
Active Directory and authentication protocols like NTLM and Kerberos are pillars of modern enterprise IT. They’re also under attack. The story of how identity infrastructure attacks went from “Jedi” to “Just another Day at the Office” is 30 years in the making.
You will learn:
The origins of a hacking tool used by 28 advanced persistent threat (APT) groups
How your organization's identity infrastructure is vulnerable to persistent attacks
Strategies for exposing stealthy identity attacks and establishing "ground truth" in your IT environment.