Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10

Video Transcription

00:00
hello and welcome to another application of the minor attack framework discussion
00:06
coming up in these next discussions were going to get into lateral movement, which is a phase that follows Discovery. The previous sets of discussions that we had. So you may be asking yourself what is lateral movement within the minor attack framework? Well,
00:23
lateral movement is the actions and adversary takes to move through your network or environment. So this is getting to their primary objective often requires exploring the network to find targets
00:36
pivoting through multiple systems and the use of custom tools to provide remote access. So depending on the sophistication of the threat actor and what it is that they're trying to achieve and what it is they're trying to get to, they will likely need to continue to move through systems to meet those objectives or goals.
00:55
Now, what we will be reviewing specifically will be application deployment software and how that could be used to their advantage exploitation of remote services and S s H hijacking. So with that, I want to thank you for your time today, and I look forward to seeing you again soon.

Up Next

Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor