On Demand Webinar: Taking the Hacker’s Toys Away – Analyzing the Top Attacker Tools and How You Can Stop Them

Analyzing the Top Attacker Tools and How You Can Stop Them

Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back.

In this webinar we will cover:

– An analysis of recent malware and attacks and the tools they used to spread through the network.

– A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them.

– Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network.

– How to gain visibility into PsExec, WMI, and RPC in general and how to create controls that distinguish valid from malicious use of these powerful tools.