Part two of the lateral movement series, focusing on the preparatory steps attackers take before moving laterally through a network.

Read the full article (PDF)

Originally published on Sqrrl Blog