AD CS Attack Paths in BloodHound

1:12:04
Domain Persistence: Detection, Triage, and Recovery

1:08:40
Synced User Attack Path Analysis with BloodHound

1:00:16
A Taste of Kerberos Abuse

55:24
Analyzing and Executing ADCS Attack Paths with BloodHound- Andy Robbins & Jonas Knudsen[SO-CON 2024]

42:37
Network Automation Series - Ep 4, Configuring Interfaces and working with host_vars

38:11
Attack Path Management, the BloodHound Enterprise Way

1:01:21
Microsoft Breach: What Happened? What Should Azure Admins Do?

40:42