View From The Attacker The Tools bg lp image


Alissa Knight’s “View From The Attacker: The Tools”

Of IT decision makers surveyed whose organizations have been breached in the past, 74% say it involved privileged access credential abuse. In this unique paper, “recovering hacker” Alissa Knight shows you the tools attackers use to move laterally, elevate their privileges, and own your network.

Become a better defender by understanding the attackers.

Download this whitepaper and learn:

  • Which tools attackers rely on in order to “live off the land”
  • LaZagne, BloodHound, and Mimikatz as attacker tools of choice
  • How attackers leverage them in the attack chain
  • Downloading, installing, and using each of the tools
  • Trends and implications for the use of these tools in the future