Deceptive-Auditing: An Active Directory Honeypots Tool
Deceptive-Auditing is a tool that deploys Active Directory honeypots and automatically enables auditing for those honeypots.
Deceptive-Auditing is a tool that deploys Active Directory honeypots and automatically enables auditing for those honeypots.
Detection Tools: Real Intelligence Threat Analytics (RITA), Security Onion, AC-Hunter Community Edition, Passer, espy Real Intelligence Threat Analytics (RITA): https://www.activecountermeasures.com/free-tools/rita – Open-source network traffic analysis tool. Security Onion: https://securityonionsolutions.com – […]
Joseph Lillo rejoined Black Hills Information Security (BHIS) in 2025 as Head of Engineering, after previously working with BHIS from 2015 to 2019, where he contributed to the development of […]
This webcast originally aired on February 27, 2025. Join us for a very special free one-hour Black Hills Information Security webcast with Corey Ham & Kelli Tarala on why your […]
Answered by Chris Brenton of Active Countermeasures | Questions compiled from the infosec community by Shelby Perry This article was originally published in the Threat Hunting issue of our infosec […]
Here we go again, discussing Active Directory, hacking, and detection engineering. tl;dr: One AD account can provide you with three detections that if implemented properly will catch common adversarial activities […]
In this video, experts delve into the intricacies of desktop application penetration testing methodologies.
Appalachia Technologies is excited to present Appalachia Advance 2024, a CyberTech Conference. Our 3rd annual in-person event brings together globally-recognized cybersecurity leaders and vendors with Appalachia’s own highly-certified staff to educate, […]