Detect and Prevent Lateral Movement
In the early stages of an attack, when attackers perform recon of the environment and identify potential avenues of attack, their main objective is to be stealthy. They are looking to make initial access undetected so that they can move laterally throughout the network before gaining privilege escalations that will allow them to move closer to their intended target. Understanding the attackers motives is key.
- What is Lateral Movement
- Common stages of lateral movement
- Recon, Credential dumping and privilege escalation
- Preventing Lateral Movement