Podcast
Questions and Answers
Explain what is lateral movement? If you are an attacker, explain the pros and cons of using Windows RDP protocol to perform lateral movement.
Explain what is lateral movement? If you are an attacker, explain the pros and cons of using Windows RDP protocol to perform lateral movement.
Lateral movement is moving from one device to another after compromising the organization's network. The goal is to get high valued data without making noise. The pros of using Windows RDP protocol to perform lateral movement are can interact the target's GUI fully, RDP sessions are encrypted, which means the data transmitted between your machine and the target machine is secure. The cons is that if someone is using the remote computer, they will see that another user has logged in so can only use it when they are not on their device.
Tell me about Nmap.
Tell me about Nmap.
Nmap is a scanning tool that maps out all the hosts in the network to discover the ones that contains valuable information. It uses IP packets in unique ways to discover which devices are active on a network, identify the services that they are running, their versions, OS, type of firewall and many other characteristics.
As an attacker, how would you perform a lateral movement using Sysinternals?
As an attacker, how would you perform a lateral movement using Sysinternals?
Sysinternals is a set of tools that allows the administrator to control Windows-based computers from a remote terminal. As an attacker, I can use it to upload, execute and interact with executables. It will not alert and are ignored by anti-virus devices since it is classified as legitimate system admin tool. It can be used to reveal services that are running and can stop that service.
How would you use file sharing to perform lateral movement?
How would you use file sharing to perform lateral movement?
How do attackers use PowerShell to run lateral movement?
How do attackers use PowerShell to run lateral movement?
Explain Window Management Instrumentation.
Explain Window Management Instrumentation.
What does privilege escalation mean?
What does privilege escalation mean?
How would an attacker perform horizontal privilege escalation?
How would an attacker perform horizontal privilege escalation?
How do attackers perform vertical privilege escalation?
How do attackers perform vertical privilege escalation?
What can attackers do using valid administrator accounts?
What can attackers do using valid administrator accounts?
What can access token manipulation do?
What can access token manipulation do?
What is application shimming and how can hackers exploit it?
What is application shimming and how can hackers exploit it?
What is DLL?
What is DLL?
How is DLL injection performed?
How is DLL injection performed?
Explain reflective DLL injection.
Explain reflective DLL injection.
Explain Stuxnet.
Explain Stuxnet.
Explain Flame.
Explain Flame.