Rate this post
Summary
This document was designed to be a useful, informational asset for those looking to understand the specific tactics, techniques, and procedures (TTPs) attackers are leveraging to compromise active directory and guidance to mitigation, detection, and prevention. And understand Active Directory Kill Chain Attack and Modern Post Exploitation Adversary Tradecraft Activity.
Table of Contents
Discovery
Privilege Escalation
Defense Evasion
Credential Dumping
Lateral Movement
Persistence
Defense & Detection
Views: 2