Singularity™ Identity VS Active Directory

This demonstration simulates a threat actor leveraging LOLBins to assess a targeted environment. The attacker uses operating system commands and Active Directory access to discover more information. We will look at how an attacker can easily access identity data, given…

Singularity™ Identity VS Active Directory

Source

This demonstration simulates a threat actor leveraging LOLBins to assess a targeted environment. The attacker uses operating system commands and Active Directory access to discover more information. We will look at how an attacker can easily access identity data, given access to a single device in the victim network. From there, we will see how Singularity Identity detects such attempts and what level of information is available on the console.

A threat actor leverages LOLBins (NLTEST, NET GROUP, NET LOCALGROUP, SYSTEMINFO) to assess the targeted environment.

Singularity™ Identity Protects Active Directory

~~~Subscribe to our channels:~~~
YouTube: https://goo.gl/e5C9f4
Website: https://www.sentinelone.com/​​
LinkedIn: https://www.linkedin.com/company/sent….
Twitter: https://twitter.com/SentinelOne​​
Facebook: https://www.facebook.com/SentinelOne/​​
Instagram: https://www.instagram.com/sentinelsec/​​
~~~~~~~~~~~~
SentinelOne is the only cybersecurity solution encompassing AI-powered prevention, detection, response, and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous platform. With SentinelOne, organizations gain full transparency into everything happening across the network at machine speed – to defeat every attack, at every stage of the threat lifecycle. To learn more visit www.sentinelone.com.