Answered step by step
Verified Expert Solution
Question
1 Approved Answer
What are the steps and methods by which such an attack can be carried out? https://awakesecurity.com/glossary/lateral-movement/ (section What is Lateral Movement?) What tools /
- What are the steps and methods by which such an attack can be carried out?
- https://awakesecurity.com/glossary/lateral-movement/ (section What is Lateral Movement?)
- What tools / techniques can be used at each step to perform this type of attack?
https://www.crowdstrike.com/epp-101/lateral-movement/ (section Common Stages of Lateral Movement)
- General and known methods by which this type of attack can be performed
http://about-threats.trendmicro.com/cloud-content/us/ent-primers/pdf/tlp_lateral_movement.pdf (pages 3-5) https://www.exabeam.com/information-security/protecting-your-network-from-lateral-movement/ (section How does lateral movement work?)
- A possible approach for both carrying out and detecting this type of attack
- https://attack.mitre.org/tactics/TA0008/
- How can Lateral Movement Attack be detected?
https://www.jpcert.or.jp/english/pub/sr/DetectingLateralMovementThroughTrackingEventLogs_version2.pdf
- https://resources.infosecinstitute.com/10-steps-detect-lateral-movement-data-breach/#gref Others links:
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started