SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAn organization sends a mass notification, "We are under attack. Disconnect all devices from the network." By removing any device before the malicious payload executes, the attacker fails to maximize their attack. In a Windows environment, multiple ways exist to execute commands remotely throughout the domain. This paper reviews various attacker techniques and identifies which technique achieves the attacker's objective the fastest. It also demonstrates how defenders can continue the defense once a domain controller is compromised.