Logo Intuity

IMQ Intuity & BloodHound by SpecterOps

Share article

#ActiveDirectory, and and increasingly #Azure Active Directory, are key elements of a computer infrastructure that manage digital identities and regulate the authentication process of users, devices and business applications.
For this reason, they are coveted targets during the execution of a cyber attack. Their compromise or even just reading key information, can give the attacker a considerable advantage.
On the other hand, having evidence of possible attack paths gives those who defend a significant advantage, allowing them to block risk situations and keeping the authentication system efficient.

We believe that ๐๐ฅ๐จ๐จ๐๐‡๐จ๐ฎ๐ง๐ ๐„๐ง๐ญ๐ž๐ซ๐ฉ๐ซ๐ข๐ฌ๐ž, by SpecterOps, is an ideal tool in this area: the ๐€๐ญ๐ญ๐š๐œ๐ค ๐๐š๐ญ๐ก ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ solution tracks and maps attack paths in #ActiveDirectory and #AzureActiveDirectory, allowing you to identify the optimal locations to block them, thus inhibiting the easy outcome of a cyber attack.

For more information visit our web page