Who says tabletop exercises can’t be fun?
In this workshop, we will cover hands-on attacks, defenses, and detection, from beginning to end, D&D style.
Oh, no!! You’ve rolled a 1, critical failure, and you’ve found out all of your backups are corrupt!
You’ve rolled an 8, looks like the attacker didn’t get Domain Admin because you have properly separated your admin accounts, good job!
A handful of the attacks we will run through include: gathering OSINT on our target, iterating through AD, capturing password hashes, and more. We will use these attacks to craft better defenses and mitigation while looking into what logs will be generated.
At the end of this class, you will walk away with an incident response playbook that you can use as a template to create more in the future.
Requirements: A laptop with a Kali VM.