Go To Home

Detecting Sunburst With Smokescreen

Detect Sunburst with Smokescreen

Inside You’ll Find

A technique-by-technique deconstruction of the Sunburst attack mapped to deception tactics can detect the techniques.

  • Perimeter and network decoys that detect credential stuffing attacks on OWA pages.
  • Active Directory and endpoint decoys that detect enumeration of privileged accounts, managed service accounts, and kerberoasting.
  • Network and high-interaction Windows decoys that detect reconnaissance prior to lateral movement.
  • Network and high-interaction Windows decoys in the Active Directory that detect lateral movement using WMI and SMB.

Grab Your Copy

Go to home

Simple solutions for detecting and containing threats. Working with us does not break the bank or your spirit. We’re the company of choice for offensive security teams with a Net Promoter Score of 70+.

© 2015-2021 Smokescreen. All rights reserved.

Solutions For
Web Application AttacksLateral MovementRansomware AttacksTargeted ThreatsSocial EngineeringMalware-less Attacks