Security Resources

This page is a reference with security documents, posts, videos and presentations I find useful for staying up to date on current security issues and exploits.
Last Updated: May 2016

Note that this page isn’t actively updated. Visit the Attack, Defense, & Detection page for updated content.


Microsoft Enterprise & Active Directory Security Documents (& Blog Posts):

NOTE: Application whitelisting is not a panacea and is a journey – it takes time to build a secure enterprise and every defensive layer helps, though each layer on its own may not be enough to stop an attack.


Raphael Mudge (@armitagehacker) has great resources (and videos) describing red team actions and is extremely helpful in understanding how attackers compromise an environment. While much of the content is specific to Cobalt Strike, it’s a treasure trove of red team information. Highly recommended! Active Directory Security Posts:


Sean Metcalf’s ( Active Directory Security Presentations

Other Great Enterprise & AD Security Resources


Microsoft Ignite 2015 Security Sessions

Windows Security Sessions:

How to Protect Your Corporate Resources from Advanced Attacks (Microsoft Advanced Threat Analytics, formerly Aorato)
Demi Albuz, Michael Dubinsky, Benny Lakunishok, Idan Plotnik
Slides (view online)

How You Can Hack-Proof Your Clients and Servers in a Day
Hasain Alshakarti, Marcus Murray

Hacker Tools for Ethical Hackers to Protect Windows Clients
Raymond Comvalius, Erdal Ozkaya
Slides (view online)

Detecting the Undetectable
Roger Grimes
Slides (view online)

Adventures in Underland: What Your System Stores on the Disk without Telling You
Paula Januszkiewicz

Hidden Talents: Things Administrators Never Expect from Their Users Regarding Security
Paula Januszkiewicz

The Ultimate Hardening Guide: What to Do to Make Hackers Pick Someone Else
Paula Januszkiewicz

Black Belt Security with Windows 10
Sami Laiho

Zero Admins – Zero Problems
Sami Laiho
Slides (view online)

Barbarians Inside the Gates: Protecting against Credential Theft and Pass the Hash Today
Aaron Margosis, Mark Simos
Slides (view online)

Advanced Windows Defense
Erdal Ozkaya
Slides (view online)

Zombies in Social Networks
Erdal Ozkaya
Slides (view online)

Modern Hardening: Lessons Learned on Hardening Applications and Services
Shawn Rabourn, Mark Simos


Windows 10 Security Sessions:
Dropping the Hammer Down on Malware Threats with Windows 10’s Device Guard
Scott Anderson, Jeffrey Sutherland
Slides (view online)

The End Game for Passwords and Credential Theft?
Nelly Porter
Slides (view online)

Overview of Windows 10 for Enterprises
Jeremy Chapman, Dustin Ingalls

Windows 10: Disrupting the Revolution of Cyber-Threats with Revolutionary Security!
Chris Hallum, Dustin Ingalls
Slides (view online)

A New Era of Threat Resistance for the Windows 10 Platform
Chris Hallum, Dustin Ingalls
Slides (view online)

Next Generation Malware Detection with Windows Defender
Dustin Ingalls, Deepak Manohar
Slides (view online)


Sysinternals Primer: Ignite 2015 Edition
Aaron Margosis

Active Directory Security Presentations (DerbyCon 2014 Videos):

 Active Directory Security Presentations (Black Hat USA 2014 Videos):

Active Directory Security Presentations (TechEd USA 2014 Videos & Presentation files):

 Pass-the-Hash & Kerberos Attack Resources:

General Hacking Videos:

Advanced Threat Tactics Course and Notes  – Great coverage of attack methodology and tactics.

Hacking History:








Security (Hack) Tools:

Defense Tools:


 General Disclaimer:
This information is for educational purposes only. Using this information to attack systems you don’t own may result in law enforcement knocking down your door. Use your own lab for testing and don’t hack your neighbor or your workplace.




(Visited 47,966 times, 3 visits today)


    • Jack Perry on April 20, 2017 at 11:30 am
    • Reply

    The link for Best Practices for Securing Active Directory is broken. I did a search, and found the following article. Haven’t had time to read it yet, but hopefully this is an updated version.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.