Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment

Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment

Black Hat via YouTube Direct link

BLOODHOUND

2 of 13

2 of 13

BLOODHOUND

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 BLOODHOUND
  3. 3 GOFETCH
  4. 4 ATTACKERS VS. DEFENDERS ATTACKERS
  5. 5 HOW CAN DEFENDERS USE GRAPHS?
  6. 6 DATA SOURCES
  7. 7 PREVENTION: VULNERABLE NODES
  8. 8 PREVENTION: DISCONNECTING NODES
  9. 9 DETECTION: LOGON GRAPH
  10. 10 DETECTION: WEIGHTED LOGON GRAPH
  11. 11 DETECTION: EXAMPLE
  12. 12 DETECTION: PROS & cons
  13. 13 INVESTIGATION

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.