web analytics

Active Directory Kill Chain – Attack and defend active directory using modern post exploitation adversary tradecraft activity

Rate this post

Summary

This document was designed to be a useful, informational asset for those looking to understand the specific tactics, techniques, and procedures (TTPs) attackers are leveraging to compromise active directory and guidance to mitigation, detection, and prevention. And understand Active Directory Kill Chain Attack and Modern Post Exploitation Adversary Tradecraft Activity.

Table of Contents

Discovery

Privilege Escalation

Defense Evasion

Credential Dumping

Lateral Movement

Persistence

Defense & Detection

Views: 2

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts