Learn how to use Windows Event Logs to catch attackers in your network, including domain admin group enumeration and mimikatz attacks! Justin Henderson (@SecurityMapper) categorizes this technique as "reverse attack analysis for detection" and shows us how to do it in this technical segment!
References to Mark Baggett's work on freq.py are made as well.
Full Show Notes
Subscribe to YouTube Channel
Content
Reverse Analyzing Attacks for Detection, Justin Henderson – Paul’s Security Weekly #519
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds