Summary
In this chapter, you learned about the importance of identity for the overall security posture of an organization. You learned about the different strategies that can be used by the Red Team to compromise a user’s identity. By learning more about the current threat landscape, the potential adversaries, and how they act, you can create a more accurate attack exercise to test the defense security controls. You learned about brute-force attacks, social engineering using SET from Kali, pass-the-hash, and how these attacks can be used to perform lateral movement in order to accomplish the attack’s mission.
In the next chapter, you will learn more about lateral movement, how the Red Team will use a hacker’s mindset to continue their mission of mapping the network, and avoiding alerts.