Tags aad1 active directory6 adc1 asrep roasting1 cortex1 cybersecurity7 DCSync1 dcsync1 docker2 docker compose1 domain controller2 elasticsearch2 elk1 entra id1 escape machine1 filebeat1 fleet dm2 forest machine1 GMSA1 hack the box1 hackthebox2 hashcat2 iam1 ids1 ips1 kafka1 kerberoast1 kerberoasting1 kerberos2 kibana1 llm2 log management1 logstash1 mcp2 mitre att&ck3 network security1 nsm1 ntlm1 ntlm hashes1 observability1 osquery2 penetration testing6 purple team3 responder1 service principal names1 siem2 soc3 SPN1 spn1 suricata1 the hive1 threat intel1 walkthrough3 wazuh1 windows2