Offensive Twitter
π [ TrustedSec @TrustedSec ] Our new #blog post by @mega_spl0it and @4ndr3W6S takes a deep dive into how Active Directory (AD) attribute-based detections can be built and how to identify where an adversary may be hiding. Read the first of this 3-part seriesβ¦
π [ TrustedSec @TrustedSec ]
In Part 2 of our new #blog series by @mega_spl0it and @4ndr3W6S, they build detections for additional attributes, this time focusing on those that can be modified using the #PowerMad tool. Read it now!
π https://hubs.ly/Q025hFdr0
π₯ [ tweet ]
In Part 2 of our new #blog series by @mega_spl0it and @4ndr3W6S, they build detections for additional attributes, this time focusing on those that can be modified using the #PowerMad tool. Read it now!
π https://hubs.ly/Q025hFdr0
π₯ [ tweet ]
π₯2π1