Case Scenario 1. Analyzing Domain Controller Security Logs, can you confirm the date & time when the kerberoasting activity occurred? 2. What is the Service Name that was targeted? 3.It is really important to identify the Workstation from which this activity occurred. What is the IP […]