Discovery and Lateral Movement
In this chapter, you will learn how to
• Identify operating system tools that can be used by attackers for information gathering
• Use open source tools and techniques to gain target situational awareness
• Execute techniques for moving laterally within an organization
During a pentesting engagement, once you have fortified your beachhead on a target system and pilfered user credentials, your next goal is to pivot to other systems within the network. Pivoting refers to using your beachhead as a gateway to other areas of the target organization’s network. Just as computer networks have default gateways to other networks, you can think of your initial access point as the default gateway to accomplish ...