Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How to Hunt for Lateral Movement on Your Network
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Different Types of Lateral Movement
- 3 Compromise - Meterpreter Session
- 4 Compromise - discovering privileges
- 5 Compromise-confirming elevated privileges
- 6 Reconnaissance -User accounts
- 7 Reconnaissance - Network
- 8 Reconnaissance - Processes
- 9 Credential Theft
- 10 Automation of detection is hard
- 11 Datasets suggested for detection of lateral movement
- 12 Stack counting
- 13 Proof of psexec access on the victim system