![Pentester Academy on Twitter: "Understand and practice the basics of attacking Active Directory using metasploit and other tools in our Attacking Active Directory with Linux lab. #LinuxAD https://t.co/nEuJFib30U https://t.co/PRGQlnsuqU" / X Pentester Academy on Twitter: "Understand and practice the basics of attacking Active Directory using metasploit and other tools in our Attacking Active Directory with Linux lab. #LinuxAD https://t.co/nEuJFib30U https://t.co/PRGQlnsuqU" / X](https://pbs.twimg.com/media/FAMddKhVkAIxqTr.jpg)
Pentester Academy on Twitter: "Understand and practice the basics of attacking Active Directory using metasploit and other tools in our Attacking Active Directory with Linux lab. #LinuxAD https://t.co/nEuJFib30U https://t.co/PRGQlnsuqU" / X
![Active Directory's Attack Surface is Huge – Here's How to Find a Threat Needle in its Log Haystack | DLT Solutions, a Tech Data company Active Directory's Attack Surface is Huge – Here's How to Find a Threat Needle in its Log Haystack | DLT Solutions, a Tech Data company](https://www.dlt.com/sites/default/files/styles/content_image/public/blogfeaturedimages/2019-09/Acitve-Directory-Blog-Post_3_8_18.jpg?itok=XVREMdMo)
Active Directory's Attack Surface is Huge – Here's How to Find a Threat Needle in its Log Haystack | DLT Solutions, a Tech Data company
![Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning | Microsoft Security Blog Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning | Microsoft Security Blog](https://www.microsoft.com/en-us/security/blog//wp-content/uploads/2020/08/fig1-pair-of-AMSI-machine-learning-models.png)