Главная
Study mode:
on
1
Intro
2
Different Types of Lateral Movement
3
Compromise - Meterpreter Session
4
Compromise - discovering privileges
5
Compromise-confirming elevated privileges
6
Reconnaissance -User accounts
7
Reconnaissance - Network
8
Reconnaissance - Processes
9
Credential Theft
10
Automation of detection is hard
11
Datasets suggested for detection of lateral movement
12
Stack counting
13
Proof of psexec access on the victim system
Description:
Explore techniques for detecting lateral movement in network security through this 46-minute conference talk from Derbycon 7. Learn about various types of lateral movement, compromise scenarios, reconnaissance methods, and credential theft. Discover the challenges of automating detection and gain insights into useful datasets for identifying lateral movement. Examine stack counting techniques and find evidence of psexec access on victim systems.

How to Hunt for Lateral Movement on Your Network

Add to list
0:00 / 0:00