Sponsored by Keepnet Labs

Windows Authentication Attacks and Forensics

Windows Authentication Attacks and Forensics See demonstrations of how attackers use credential dependencies to gain elevated access to systems and to perform lateral movement. Plus, learn how to detect and prevent many of these attacks.

Share this post

Leave a Reply

Your email address will not be published. Required fields are marked *