Audit Active Directory Attack Paths with Bloodhound
Recon Main Blog
2023-04-19 06:15:25
收藏
In our experience working with SMB and enterprise IT teams, it is often unknown just how far and wide their Active Directory (AD) environment truly is and how many possible attack paths exist for a would-be threat actor. This is true because it's a non-trivial activity to sit down and map these environments out in a way that makes it possible to begin hardening and mitigating attack paths.
目录
最新
- Every Pentest Makes us Better
- Delivering AI Superpowers to Security Teams: Introducing Recon Labs
- Microsoft Teams Social Engineering: A Ransomware Attack Vector
- Mastering Threat Hunting Operations: A Deep Dive into Recon InfoSec’s Approach
- Prolific Phishing Campaign Leveraging Zoom's Infrastructure
- Detecting Fake CAPTCHA Campaigns: ClickFix, ClearFake, and Etherhide
- SigmaHQ Essentials - Building Robust Detection Capabilities - Part 2
- Effective Threat Hunting