Podcast
Questions and Answers
Explain what is lateral movement? If you are an attacker, explain the pros and cons of using Windows RDP protocol to perform lateral movement.
Explain what is lateral movement? If you are an attacker, explain the pros and cons of using Windows RDP protocol to perform lateral movement.
Lateral movement is moving from one device to another after compromising the organization's network. The goal is to get high valued data without making noise. The pros of using Windows RDP protocol to perform lateral movement are can interact the target's GUI fully, RDP sessions are encrypted, which means the data transmitted between your machine and the target machine is secure. The cons is that if someone is using the remote computer, they will see that another user has logged in so can only use it when they are not on their device.
Tell me about Nmap.
Tell me about Nmap.
Nmap is a scanning tool that maps out all the hosts in the network to discover the ones that contains valuable information. It uses IP packets in unique ways to discover which devices are active on a network, identify the services that they are running, their versions, OS, type of firewall and many other characteristics.
As an attacker, how would you perform a lateral movement using Sysinternals?
As an attacker, how would you perform a lateral movement using Sysinternals?
Sysinternals is a set of tools that allows the administrator to control Windows-based computers from a remote terminal. As an attacker, I can use it to upload, execute and interact with executables. It will not alert and are ignored by anti-virus devices since it is classified as legitimate system admin tool. It can be used to reveal services that are running and can stop that service.
How would you use file sharing to perform lateral movement?
How would you use file sharing to perform lateral movement?
Signup and view all the answers
How do attackers use PowerShell to run lateral movement?
How do attackers use PowerShell to run lateral movement?
Signup and view all the answers
Explain Window Management Instrumentation.
Explain Window Management Instrumentation.
Signup and view all the answers
What does privilege escalation mean?
What does privilege escalation mean?
Signup and view all the answers
How would an attacker perform horizontal privilege escalation?
How would an attacker perform horizontal privilege escalation?
Signup and view all the answers
How do attackers perform vertical privilege escalation?
How do attackers perform vertical privilege escalation?
Signup and view all the answers
What can attackers do using valid administrator accounts?
What can attackers do using valid administrator accounts?
Signup and view all the answers
What can access token manipulation do?
What can access token manipulation do?
Signup and view all the answers
What is application shimming and how can hackers exploit it?
What is application shimming and how can hackers exploit it?
Signup and view all the answers
What is DLL?
What is DLL?
Signup and view all the answers
How is DLL injection performed?
How is DLL injection performed?
Signup and view all the answers
Explain reflective DLL injection.
Explain reflective DLL injection.
Signup and view all the answers
Explain Stuxnet.
Explain Stuxnet.
Signup and view all the answers
Explain Flame.
Explain Flame.
Signup and view all the answers