🛡️ Severitate: Medium

Security White Paper 2017-002_Detecting Lateral Movements in Windows Infrastructure Tuesday, April 18, 2017 04:27:00 PM CEST Lateral movement techniques are widely used in sophisticated cyber-attacks in particular in Advanced Persistent Threats (APTs). An adversary uses these techniques to access other hosts from a compromised system and get access to sensitive resources, such as mailboxes, shared folders, or credentials. This white-paper provides guidelines to detectthe lateral movements exploiting NTLM and Kerberos protocols in a Windows 7 and 2008 based environments.

🌍 Limbă / Language:
Traducere automată / Automatic translation
CERT-EU security guidance: Security White Paper 2017-002_Detecting Lateral Movements in Windows Infrastructure Tuesday, April 18, 2017 04:27:00 PM CEST Lateral movement techniques are widely used in sophisticated cyber-attacks in particular in Advanced Persistent Threats (APTs). An adversary uses these techniques to access other hosts from a compromised system and get access to sensitive resources, such as mailboxes, shared folders, or credentials. This white-paper provides guidelines to detectthe lateral movements exploiting NTLM and Kerberos protocols in a Windows 7 and 2008 based environments.

📋 Detalii advisory

Regiune: 🌍 Internațional (Extern)
Sursă: CERT-EU
Publicat: 12 octombrie 2025
top
ro_RORomanian
Simplificăm IT-ul.
Pentru o lume complexă.
Parteneriate pentru Platforme