Detection of DNS Tunnels
Exfiltration Over Unencrypted Non-C2 Protocol
Exfiltration Over Unencrypted Non-C2 Protocol
Automated Exfiltration
Automated Exfiltration
Steal or Forge Kerberos Tickets, Kerberoasting
System Binary Proxy Execution, Rundll32