Lateral Movement
Overview
Lateral movement uses compromised credentials, hashes, or tokens to access additional systems in the network. After gaining initial access and harvesting credentials, lateral movement expands control — from a single workstation to file servers, database servers, domain controllers, and ultimately domain-wide compromise. The choice of technique depends on available credentials, network access, and detection considerations.
Topics in This Section
General Approach
- Identify targets — use enumeration data (shares, sessions, logged-on users) to find high-value targets
- Choose technique — match the technique to available credentials and detection posture
- Authenticate — use password, NTLM hash (pass-the-hash), or Kerberos ticket (pass-the-ticket)
- Execute — run commands, deploy tools, or establish persistent access
- Harvest — extract credentials from the new system and repeat