Media Summary: Anton, a Principal Threat Hunting and Response Analyst in our SOC, walks through a real-world security incident. This case ... In this video, I will be exploring the process of performing Kevin Zuk, Threat Hunting Engineer at Anvilogic, leads a hands-on workshop on what

Lateral Movement Windows Services - Detailed Analysis & Overview

Anton, a Principal Threat Hunting and Response Analyst in our SOC, walks through a real-world security incident. This case ... In this video, I will be exploring the process of performing Kevin Zuk, Threat Hunting Engineer at Anvilogic, leads a hands-on workshop on what Dear Defronixters !! This is the 10th Class of our SOC Analyst Job Ready Free Blue Teaming Course by Defronix Cyber Security. Welcome to Zero Trust Cyber Tips and Tricks. In today's video we will be talking about Mitre ATT&CK Tactics and Techniques. Active Directory remains one of the most targeted environments in enterprise networks. In this webinar, we break down how ...

In this video we'll be exploring how to attack, detect and defend against the abuse of Principal Security Specialists Phil Hagen and Brian Donohue break down some of the techniques attackers use to traverse ... WSUS Abuse has been around for a while, so this video is not demonstrating anything groundbreaking. But it certainly is fun using ... Welcome to the Defender Experts for XDR Video Series. In this series, we aim to cover key aspects of Defender Experts for XDR ... Is there a security boundary between Active Directory and Entra ID in a hybrid environment? The answer to this question, while ... This hands-on, scenario-driven workshop delves into how attackers

If you are new and interested in what has to offer, then you are in the right place! We are taking a look at the ...

Photo Gallery

Lateral Movement - Windows Services
SOC Incident Walkthrough: Lateral Movement & VPN Compromise
Windows Red Team Lateral Movement Techniques - PsExec & RDP
Detection Dispatch Ep. 11: Lateral Movement in Windows Networks
Class 10 |  Lateral Movement & Privilege Escalation - SOC Analyst Job Ready Free Course (Hindi)
Mitre ATT&CK Tactics, Techniques and Mitigations Series: Part 10 Lateral Movement
Active Directory Breached | Lateral Movement & Privilege Escalation Live Webinar
Windows Manipulation: Lateral Movement & Pivoting Pt 1 / Windows Hacking PenTesting Tutorial
Abusing Windows Services (Execution, Persistence & Privilege Escalation)
Abusing Windows Admin Shares (Lateral Movement)
THM Lateral Movement and Pivoting
What is lateral movement?
View Detailed Profile
Lateral Movement - Windows Services

Lateral Movement - Windows Services

Windows services

SOC Incident Walkthrough: Lateral Movement & VPN Compromise

SOC Incident Walkthrough: Lateral Movement & VPN Compromise

Anton, a Principal Threat Hunting and Response Analyst in our SOC, walks through a real-world security incident. This case ...

Windows Red Team Lateral Movement Techniques - PsExec & RDP

Windows Red Team Lateral Movement Techniques - PsExec & RDP

In this video, I will be exploring the process of performing

Detection Dispatch Ep. 11: Lateral Movement in Windows Networks

Detection Dispatch Ep. 11: Lateral Movement in Windows Networks

Kevin Zuk, Threat Hunting Engineer at Anvilogic, leads a hands-on workshop on what

Class 10 |  Lateral Movement & Privilege Escalation - SOC Analyst Job Ready Free Course (Hindi)

Class 10 | Lateral Movement & Privilege Escalation - SOC Analyst Job Ready Free Course (Hindi)

Dear Defronixters !! This is the 10th Class of our SOC Analyst Job Ready Free Blue Teaming Course by Defronix Cyber Security.

Mitre ATT&CK Tactics, Techniques and Mitigations Series: Part 10 Lateral Movement

Mitre ATT&CK Tactics, Techniques and Mitigations Series: Part 10 Lateral Movement

Welcome to Zero Trust Cyber Tips and Tricks. In today's video we will be talking about Mitre ATT&CK Tactics and Techniques.

Active Directory Breached | Lateral Movement & Privilege Escalation Live Webinar

Active Directory Breached | Lateral Movement & Privilege Escalation Live Webinar

Active Directory remains one of the most targeted environments in enterprise networks. In this webinar, we break down how ...

Windows Manipulation: Lateral Movement & Pivoting Pt 1 / Windows Hacking PenTesting Tutorial

Windows Manipulation: Lateral Movement & Pivoting Pt 1 / Windows Hacking PenTesting Tutorial

This is part 1 of the

Abusing Windows Services (Execution, Persistence & Privilege Escalation)

Abusing Windows Services (Execution, Persistence & Privilege Escalation)

In this video we'll be exploring how to attack, detect and defend against the abuse of

Abusing Windows Admin Shares (Lateral Movement)

Abusing Windows Admin Shares (Lateral Movement)

In this video we'll be exploring how to attack, detect and defend against the abuse of

THM Lateral Movement and Pivoting

THM Lateral Movement and Pivoting

commands in description.

What is lateral movement?

What is lateral movement?

Principal Security Specialists Phil Hagen and Brian Donohue break down some of the techniques attackers use to traverse ...

DEMO - Abusing WSUS for Lateral Movement

DEMO - Abusing WSUS for Lateral Movement

WSUS Abuse has been around for a while, so this video is not demonstrating anything groundbreaking. But it certainly is fun using ...

Welcome to Microsoft Defender Experts for XDR Video Series - Ep #3: Lateral Movement Paths (LMPs)

Welcome to Microsoft Defender Experts for XDR Video Series - Ep #3: Lateral Movement Paths (LMPs)

Welcome to the Defender Experts for XDR Video Series. In this series, we aim to cover key aspects of Defender Experts for XDR ...

ATT&CK Deep Dive: Lateral Movement Pt. 2 (Shutting Down Lateral Movement)

ATT&CK Deep Dive: Lateral Movement Pt. 2 (Shutting Down Lateral Movement)

Responding to

Black Hat USA 2025 | Advanced Active Directory to Entra ID Lateral Movement Techniques

Black Hat USA 2025 | Advanced Active Directory to Entra ID Lateral Movement Techniques

Is there a security boundary between Active Directory and Entra ID in a hybrid environment? The answer to this question, while ...

EP. 6: Microsoft Sentinel: Protecting against Lateral Movement

EP. 6: Microsoft Sentinel: Protecting against Lateral Movement

Explore how

Smuggling payload via Windows services display name - Lateral movement

Smuggling payload via Windows services display name - Lateral movement

conduct

Shadow Steps Understanding and Detecting User Impersonation and Lateral Movement in Active Directory

Shadow Steps Understanding and Detecting User Impersonation and Lateral Movement in Active Directory

This hands-on, scenario-driven workshop delves into how attackers

Lateral Movement and Pivoting | TryHackMe - Offensive Security

Lateral Movement and Pivoting | TryHackMe - Offensive Security

If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the ...