What is?
Lateral Movement
Adversary techniques to move between systems after initial compromise.
Segmentation, identity hardening, and EDR detections help contain lateral movement.
- Credential theft
- Pass-the-hash/ticket
- Remote exec abuse
Explore More
Adversary techniques to move between systems after initial compromise.
Segmentation, identity hardening, and EDR detections help contain lateral movement.