Tags aad1 active directory6 adc1 asrep roasting1 cortex1 cybersecurity8 DCSync1 dcsync1 docker3 docker compose1 domain controller2 elasticsearch3 elk1 entra id1 escape machine1 filebeat2 fleet dm2 forest machine1 GMSA1 hack the box1 hackthebox2 hashcat2 iam1 ids1 incident response1 ips1 kafka2 kerberoast1 kerberoasting1 kerberos2 kibana2 kubernetes1 llm3 log management2 logstash2 mcp3 mitre att&ck3 network security1 nsm1 ntlm1 ntlm hashes1 observability2 osquery2 penetration testing6 purple team3 responder1 service principal names1 siem3 soar1 soc4 SPN1 spn1 suricata1 the hive1 threat intel1 walkthrough3 wazuh2 windows2