What is?

Lateral Movement

Adversary techniques to move between systems after initial compromise.

Segmentation, identity hardening, and EDR detections help contain lateral movement.

  • Credential theft
  • Pass-the-hash/ticket
  • Remote exec abuse
Explore More

Other Glossary Entries