Our free step-by-step ebook will show you all the tools and tactics that hackers use to leverage AD in post-exploitation.
Specifically, we'll explain how crackmapexec, PowerView, and a little graph theory can be used to ferret out vulnerabilities in your Active Directory environments before hackers find them.
Chapter 1: Crackmapexec and PowerView
Chapter 2: Getting Stuff Done With PowerView
Chapter 3: Chasing Power Users
Chapter 4: Graph Fun
Chapter 5: Admins and Graphs
Chapter 6: The Final Case
Download our ebook today and strike back at hackers!