Active Directory - Lateral Movement and Pivoting
Moving Through the Network
What is Lateral Movement? Simply put, lateral movement is the group of techniques used by attack...
Spawning Processes Remotely
This task will look at the available methods an attacker has to spawn a process remotely, allowin...
Moving Laterally Using WMI
We can also perform many techniques discussed in the previous task differently by using Windows M...
Use of Alternate Authentication Material
By alternate authentication material, we refer to any piece of data that can be used to access a ...
Abusing User Behaviour
Under certain circumstances, an attacker can take advantage of actions performed by users to gain...
Port Forwarding
Most of the lateral movement techniques we have presented require specific ports to be available ...
Conclusion
In this room, we have discussed the many ways an attacker can move around a network once they hav...