Back to Resources
Singularity™ Identity VS Active Directory
Singularity™ Identity VS Active Directory
This demonstration simulates a threat actor leveraging LOLBins to assess a targeted environment. The attacker uses operating system commands and Active Directory access to discover more information. We will look at how an attacker can easily access identity data, given access to a single device in the victim network. From there, we will see how […]
Watch Now