Have you ever pen tested your Active Directory environment?

Our free step-by-step ebook will show you all the tools and tactics that hackers use to leverage AD in post-exploitation.

Specifically, we'll explain how crackmapexec, PowerView, and a little graph theory can be used to ferret out vulnerabilities in your Active Directory environments before hackers find them.

What's covered?

Chapter 1: Crackmapexec and PowerView

Chapter 2: Getting Stuff Done With PowerView

Chapter 3: Chasing Power Users

Chapter 4: Graph Fun

Chapter 5: Admins and Graphs

Chapter 6: The Final Case

Download our ebook today and strike back at hackers!


Download our ebook today!