Recursos/Singularity™ Identity vs Privilege Escalation (Mimikatz and Offensive Tools)
agosto 22, 2022
Singularity™ Identity vs Privilege Escalation (Mimikatz and Offensive Tools)
The attack on Cisco shows that identity-based attacks are a leading threat vector used in data breaches. From the perspective of a threat actor, targeting identity and access management gaps through compromised credentials is the quickest path to reaching a target’s resources and critical data. Attackers are very aware that Active Directory is the crown jewel of a business, granting them the ability to exfiltrate sensitive information, install backdoors, alter security policies, and more.
On some victim’s endpoints, the threat actor used MiniDump from Mimikatz to dump LSASS. They also leveraged the “wevtutil.exe” utility to identify and clear event logs generated on the system.
Singularity™ Ranger AD Assessor detects the modification of authentication mechanisms on a domain controller, thwarting threat actors that attempt to patch the authentication process to bypass the authentication mechanisms.
Singularity™ Ranger AD Assessor detects the modification of authentication mechanisms on a domain controller, thwarting threat actors that attempt to patch the authentication process to bypass the authentication mechanisms.
Singularity™ Identity vs Privilege Escalation (Mimikatz and Offensive Tools)
Recursos relacionados
Hoja de datos
Singularity Complete
Singularity Complete ofrece capacidades líderes en el mercado de protección de cargas de trabajo en la nube y endpoints impulsadas…
Leer ahora
Resource
SentinelOne PartnerOne - America's 2025
⛳️ Last week in Pebble Beach the America's best cybersecurity partners came together for our annual PartnerOne summit. Check out…
View Asset
Resource
Just a Sec: Cybersecurity Unfiltered—Fast, Frank, and From the Front Lines
Welcome to the first-ever Just A Sec, a no-holds-barred, quick-fire monthly livestream. It’s cybersecurity like you’ve never heard it before—unfiltered,…
View Asset
Resource
LABScon24 Replay | A Walking Red Flag (With Yellow Stars) | Cary & Benincasa
China's cybersecurity competition ecosystem has grown significantly since 2017, with over 150 unique events and more than 400 total competitions.…
View Asset
Disfrute de la plataforma de ciberseguridad más avanzada del mundo
Descubra cómo nuestra plataforma de ciberseguridad inteligente y autónoma protege a su empresa, ahora y en el futuro.