Lab-based Active Directory compromise chain simulating real-world lateral movement. Kerberoasting, Pass-the-Hash, privilege escalation, and ghost LSASS session detection via Volatility memory forensics. This scenario formed the basis of the Week 5 Technical Precision Award — Red Team Leaders × 0xDelta Research (March 2026).
This case study is being written up with full scenario documentation, investigation timeline, IOC table, detection strategy, and conclusion. Check back soon or contact me directly to discuss this investigation.