Chapter 6

Maintaining Control and Lateral Movement

This chapter unveils the various techniques deployed by attackers to maintain control and persist in the network for a long period of time. The attackers perform network reconnaissance in the network to compromise additional systems in the network so that information can be exfiltrated at a large scale. The attacker uses custom, self-made, and public available tools such as Remote Access Toolkits (RATs) to perform different tasks such as port scanning and exploiting vulnerabilities in the target network. This step is very significant from the perspective of executing targeted attacks for a long duration of time without being detected.

Keywords

Lateral Movement; Marinating Control; Backdoors; Remote ...

Get Targeted Cyber Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.