Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this on-demand webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back.
Watch now to learn:
- Analysis of recent malware attacks like SamSam, Petya/NotPetya, etc.
- Closer look at underlying protocols and challenges to control them
- New controls for NTLM and how to block pass-the-hash
- How to gain visibility into PsExec, WMI and RCI and distinguish malicious use