Severitate: Medium
Security White Paper 2017-002_Detecting Lateral Movements in Windows Infrastructure Tuesday, April 18, 2017 04:27:00 PM CEST Lateral movement techniques are widely used in sophisticated cyber-attacks in particular in Advanced Persistent Threats (APTs). An adversary uses these techniques to access other hosts from a compromised system and get access to sensitive resources, such as mailboxes, shared folders, or credentials. This white-paper provides guidelines to detectthe lateral movements exploiting NTLM and Kerberos protocols in a Windows 7 and 2008 based environments.
🌍 Limbă / Language:
Traducere automată / Automatic translation
CERT-EU security guidance: Security White Paper 2017-002_Detecting Lateral Movements in Windows Infrastructure
Tuesday, April 18, 2017 04:27:00 PM CEST
Lateral movement techniques are widely used in sophisticated cyber-attacks in particular in Advanced Persistent Threats (APTs). An adversary uses these techniques to access other hosts from a compromised system and get access to sensitive resources, such as mailboxes, shared folders, or credentials. This white-paper provides guidelines to detectthe lateral movements exploiting NTLM and Kerberos protocols in a Windows 7 and 2008 based environments.
📋 Detalii advisory
Regiune: 🌍 Internațional (Extern)
Sursă: CERT-EU
Publicat: 5 octombrie 2025