Alissa Knight’s “View From The Attacker: The Tools”
Of IT decision makers surveyed whose organizations have been breached in the past, 74% say it involved privileged access credential abuse. In this unique paper, “recovering hacker” Alissa Knight shows you the tools attackers use to move laterally, elevate their privileges, and own your network.
Become a better defender by understanding the attackers.
Download this whitepaper and learn:
Which tools attackers rely on in order to “live off the land”
LaZagne, BloodHound, and Mimikatz as attacker tools of choice
How attackers leverage them in the attack chain
Downloading, installing, and using each of the tools
Trends and implications for the use of these tools in the future