Lateral movement
To achieve their objectives, a threat actor will need to move within our network, allowing us to detect them. As we mentioned in the previous section, the attacker must map the network to know where to pivot inside our information system.
In this section, we will look at various sub-techniques related to the remote services technique, which is largely used by threat actors.
T1021 – Remote services
Once attackers obtain valid credentials, they will use them on all the assets they discovered in the discovery phase. The CTI taught us that they will mostly rely on the following:
- T1021.001 – Remote desktop protocol
- T1021.002 – SMB/Windows admin shares
- T1021.004 – SSH
The good news is that lateral movement detection is quite similar to discovery detection and even covers other lateral movement techniques (relying on WinRM, DCOM objects, and so on):
Once lateral...