Overview
Syllabus
Introduction
What prompted this presentation
Sun Encrypted Drive
Proxy and DNS logs
Callouts
Kali Linux
Metasploit
Burp Suite
Nikto
MeltyGo
Korra
DHCP logs
Look at all DHCP addresses
Make it simple for yourself
Use sysinternals tool
Detect pass the hash
Get Windows security logs
Windows admins dont understand how this works
Microsofts Guide
NSA Guide
Event Log Monitoring
Event Log Detection
Brute Force Attacks
Username Guessing
False Positives
Port Scans
Pentest
Pen Test Story
The Gig Was Up
The Good Way To Respond
The Bad Way To Respond
Did I Work With Thee
The Bigger Takeaway