The first part of a comprehensive series on lateral movement techniques. Essential reading for threat hunters and security analysts looking to understand how attackers move through networks.
Read the full article (PDF)
Originally published on Sqrrl Blog