Offensive Security

Lateral Movement Techniques

Moving through a network after initial compromise.

Operational Phase

01

Pivoting

Using a compromised host to attack others in the network.

02

Port Forwarding

SSH tunneling and local/remote forwarding.

03

Pass-the-Hash

Authenticating without cracking the password.

04

SOCKS Proxies

Tunneling tool traffic through dynamic proxies.