Follow

Blog post: Deploying honeytokens in Active Directory & How to trick attackers with deceptive BloodHound paths - apt29a.blogspot.com/2019/11/de
Reading: 11 min
Published: 11/03/2019

Sign in to participate in the conversation
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.