Advanced Threat Tactics (6 of 9): Lateral Movement

Originally video published at: Advanced Threat Tactics (6 of 9): Lateral Movement – Cobalt Strike Videos




Lateral Movement is abusing trust relationships to attack systems in an enterprise network. This video covers host and user enumeration, remote control of systems without using malware, and remote code execution with the Beacon payload. You’ll also learn to steal tokens, use credentials, pass-the-hash, and generate Kerberos Golden Tickets.