Lateral Tool Transfer

Cybrary
Course
COMING SOON

Once adversaries compromise your network, they can transfer tools between systems in order to stage them for later use or to support lateral movement. They may use file sharing protocols or copy files with existing tools like scp, sftp and ftp. Learn how to spot and mitigate this behavior so you can stop adversaries in their tracks.

Time
50 minutes
Difficulty
Intermediate
CEU/CPE
1
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Description

To achieve their goals, adversaries will take advantage of their ability to stage files and programs in key locations to enable lateral movement and plan for a future move. Threat actors like FIN10 have been known to deploy Meterpreter stagers on a network after performing a lateral movement.

It's important to know how to mitigate this type of activity, as it may not always be easy to detect.

Get the hands-on skills you need to detect and mitigate this attack in Cybrary's MITRE ATT&CK Framework courses aligned to the tactics and techniques used by the financially motivated threat group FIN10. Prevent adversaries from accomplishing the tactic of Lateral Movement in your environment today.

Instructed By
Matthew Mullins
Matthew Mullins
Technical Manager, Red Team
Instructor
Owen Dubiel
Owen Dubiel
Security Practitioner
Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Lateral Tool Transfer Certificate of Completion