Singularity™ Identity VS Active Directory

This demonstration will simulate a threat actor leveraging LOLBins to assess a targeted environment. The attacker is utilizing Operating System commands and Active Directory access to discover more infromation. We will look at how an attacker can easily access identity data, given access to a single device in the victim network. From there, we will see how Singularity Identity detects such attempts and what level of information is available on the console.

Verified by MonsterInsights