What is Lateral Movement?

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
8 hours 29 minutes
Difficulty
Beginner
CEU/CPE
10
Video Transcription
00:00
hello and welcome to another application of the minor attack framework discussion
00:06
coming up in these next discussions were going to get into lateral movement, which is a phase that follows Discovery. The previous sets of discussions that we had. So you may be asking yourself what is lateral movement within the minor attack framework? Well,
00:23
lateral movement is the actions and adversary takes to move through your network or environment. So this is getting to their primary objective often requires exploring the network to find targets
00:36
pivoting through multiple systems and the use of custom tools to provide remote access. So depending on the sophistication of the threat actor and what it is that they're trying to achieve and what it is they're trying to get to, they will likely need to continue to move through systems to meet those objectives or goals.
00:55
Now, what we will be reviewing specifically will be application deployment software and how that could be used to their advantage exploitation of remote services and S s H hijacking. So with that, I want to thank you for your time today, and I look forward to seeing you again soon.
Up Next