© Morey J. Haber, Darran Rolls 2020
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/978-1-4842-5165-2_2

2. A Nuance on Lateral Movement

Morey J. Haber1  and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 

To a threat actor, lateral movement means all the difference between compromising a single resource and potentially navigating throughout an organization to establish a persistent presence. Their goal is to remain undetected and ultimately conduct their nefarious mission even if some defenses manage to track their infiltration. While the hacker might succeed based on an opportunistic phishing attack or a targeted attack based on stolen credentials or an exploit, lateral movement is the means to find data of value, compromise ...

Get Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.