Ayo Secu

  • 홈
  • 태그
  • 방명록

Lateral Movement 2

Lateral Movement and Privilege Escalation Techniques

Lateral Movement and Privilege Escalation TechniquesLateral movement and privilege escalation are common attack techniques where attackers navigate through a cloud environment to gain elevated permissions or access additional resources. These techniques are especially critical in cloud environments due to the interconnected nature of services, identities, and APIs.1. Lateral Movement Techniquesa..

Security Terms/Infrastructure Virtualization 2025.01.30

Lateral Movement

Lateral MovementIn the lateral movement phase, attackers leverage their initial foothold to move within the network, accessing additional systems and resources. This phase enables them to spread throughout the environment, often with the goal of reaching high-value assets, escalating privileges, or maintaining persistent access. Common lateral movement techniques include remote access protocols ..

Security Terms/Attack Structure 2025.01.16
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

incident management, network, web application, security terms, NETWORK SECURITY, forensic, threat modeling, os implementation, mitigations, Cryptography, security, Exploit, systems, infrastructure virtualization, Authentication, identity, Digital Forensics, attack structure, cybersecurity, Detection,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바