Chapter 6

Maintaining Control and Lateral Movement

This chapter unveils the various techniques deployed by attackers to maintain control and persist in the network for a long period of time. The attackers perform network reconnaissance in the network to compromise additional systems in the network so that information can be exfiltrated at a large scale. The attacker uses custom, self-made, and public available tools such as Remote Access Toolkits (RATs) to perform different tasks such as port scanning and exploiting vulnerabilities in the target network. This step is very significant from the perspective of executing targeted attacks for a long duration of time without being detected.


Lateral Movement; Marinating Control; Backdoors; Remote ...

Get Targeted Cyber Attacks now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.