Lateral Movement (TA0008)

DDoSPedia An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

Security Research Center

Often threat actors find that their foothold acquired during initial access is not what they hoped for. In that case, threat actors will likely leverage techniques to move laterally across the target environment. Threat actors may, for example, leverage internal spear phishing, based on discovered information, as a technique to gain access to additional resources or exploit other users. They also might leverage alternate authentication tokens such as password hashes or Kerberos tickets or abuse remote services through valid accounts acquired during the credential access and discovery phases.

 

DDoSPedia Index

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Radware Blog
Security Research Center