The Cyber Threat Perspective

(Replay) How To Defend Against Lateral Movement


Listen Later

In this replay, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use these methods to gain unauthorized access, evade detection, and enable malicious activities. They also discuss precursors to lateral movement and strategies to restrict it, such as least privilege access, network segmentation, and monitoring. The podcast emphasizes the importance of understanding lateral movement and implementing comprehensive security measures to mitigate these threats.

Resources

  • https://www.reddit.com/r/cybersecurity/comments/1ellylu/what_lateral_attacks_have_you_been_seeing/
  • The DFIR Report
  • Lateral Movement, Tactic TA0008 - Enterprise | MITRE ATT&CK®

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Spencer's Twitter: https://x.com/techspence
Spencer's LinkedIn: https://linkedin.com/in/SpencerAlessi

Work with Us: https://securit360.com

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/links

Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.

...more
View all episodesView all episodes
Download on the App Store

The Cyber Threat PerspectiveBy SecurIT360

  • 5
  • 5
  • 5
  • 5
  • 5

5

15 ratings


More shows like The Cyber Threat Perspective

View all
CyberWire Daily by N2K Networks

CyberWire Daily

1,031 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,109 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

138 Listeners