A Taste of Kerberos Abuse
1:01:44
The BloodHound 4.3 Release: Get Global Admin More Often
1:39:03
Red + Blue, How Purple Are You? Identifying Gaps in The Spectrum of Security
53:10
Delegating Kerberos To Bypass Kerberos Delegation Limitation by Charlie Bromberg
54:25
Attackers Follow Security Principles Too
1:22:36
Workshop 1: Introduction & Overview | Complex Systems Modeling w MAIDS, GDS & cadCAD
41:57
Hunting Russia FSB's Most Sophisticated "Snake" Malware | Threat SnapShot
1:08:40
Synced User Attack Path Analysis with BloodHound
1:14:42