Articles
Parallax: Kerberos Security
This is research on detecting attacks on Kerberos using traffic analysis.
Articles
This is research on detecting attacks on Kerberos using traffic analysis.
Video
Research on detecting attacks on Active Directory based on network traffic analysis.
Articles
Pivoting is used in post-exploitation and has many methods, this article will talk about pivoting using Nebula.