Lateral Movement Techniques and How to Detect Them

STEALTHbits Technologies, Inc © 2019
Identify Threats. Secure Data. Reduce Risk.
STEALTHbits Logo

Lateral movement techniques are leveraged by attackers to move throughout a network, slowly increasing privileges until they achieve their end goal. Pass-the-Hash, Pass-the-Ticket, and Overpass-the-Hash are three of the most common lateral movement methods performed on Windows systems.  

In this webinar, General Manager of Products, Jeff Warren takes a deep dive into these attack methods. View the recording to learn:

  • What to look for and how to understand Active Directory lateral movement attacks
  • Practical approaches on how to detect them

View the Webinar!

LinkedIn
Twitter
YouTube