Keegan Keplinger

Research and Reporting Lead, Threat Intelligence Team at eSentire
On the record
Represented by:
Recent Quotes
Sign up to view all
  • They ran Mimikatz, so they would have collected all the hashes for passwords, and then…you can crack them locally, you can run dictionaries against them and find those weak passwords that people use.

    22 October 2020
Employment
Sign up to view all
  • eSentire
    Research and Reporting Lead, Threat Intelligence Team