Back to Resources

Singularity™ Identity VS Active Directory

This demonstration simulates a threat actor leveraging LOLBins to assess a targeted environment. The attacker uses operating system commands and Active Directory access to discover more information. We will look at how an attacker can easily access identity data, given access to a single device in the victim network. From there, we will see how Singularity Identity detects such attempts and what level of information is available on the console.

A threat actor leverages LOLBins (NLTEST, NET GROUP, NET LOCALGROUP, SYSTEMINFO) to assess the targeted environment.

Singularity™ Identity Protects Active Directory

지금 읽기

세계에서 가장 앞선 사이버 보안 플랫폼 경험하기

지능적인 자율형 사이버 보안 플랫폼이 현재와 미래의 조직을 어떻게 보호할 수 있는지 알아보세요.