Lateral Movement Techniques
Moving through a network after initial compromise.
Operational Phase
01
Pivoting
Using a compromised host to attack others in the network.
02
Port Forwarding
SSH tunneling and local/remote forwarding.
03
Pass-the-Hash
Authenticating without cracking the password.
04
SOCKS Proxies
Tunneling tool traffic through dynamic proxies.