Discover how to install and run attacker tools to hunt vulnerabilities in your environment before the pentesters (or attackers!) do. Through hands-on demonstrations of powerful techniques like Bloodhound, AD Certificate Services attacks, Responder, and strategic password audits, you'll learn to identify and eliminate the easy targets attackers exploit first. Equip yourself to think like the adversary—and strengthen your defenses from within!