top of page

Log Analysis and Tracking Lateral Movement in Using Event IDs

Pages Count

8 Pages

Links for the courses

For Understanding Lateral Movement Checkout below link


--------------------------------------------------------------------------------------------------------------------------


Article Name

Link

Log Analysis – It’s Not About Knowing, It’s About Correlating

Tracking Kerberos & NTLM Authentication Failures and Investigation

Understanding Where Windows Authentication Logs Actually Live — From AD to Entra ID

Event Log Clearing and Malware Execution: Evidence from Windows Logs

PowerShell Logging: Making the Invisible Visible

Tracking Lateral Movement — Named Pipes, Scheduler, Services, Registry, and DCOM (Event IDs)

Tracking Lateral Movement: PowerShell Remoting, WMIC, Explicit Credentials, NTLM Relay Attacks, Credential Theft and Reuse (Event IDs)


Your Instructor

Dean

Dean
bottom of page