From the course: Ethical Hacking: Introduction to Ethical Hacking
Unlock the full course today
Join today to access over 23,200 courses taught by industry experts.
Identifying adversary behavior
From the course: Ethical Hacking: Introduction to Ethical Hacking
Identifying adversary behavior
- [Instructor] Malicious actors use several techniques to infiltrate a network. In this segment, we'll review several adversarial behaviors, such as lateral movement, DNS tunneling, and Command Line Interface Execution. Let's start with lateral movement, which are the methods malicious actors use to navigate through a system with the goal of gaining access to other systems and protected data. Many times the malicious actor must go through several phases to achieve lateral movement. The process begins with a reconnaissance exercise to gather information, which then moves to the initial access phase where they gain a foothold in the network. The process then moves to privilege escalation to gain higher levels of access to other systems. At that point, the attacker achieves the lateral movement phase to exploit weak security methods and expand their control and reach. This can be achieved using several techniques. They…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
Understanding the cyber kill chain4m 48s
-
(Locked)
Utilizing MITRE ATT&CK3m 40s
-
(Locked)
Analyzing using the diamond model4m 41s
-
(Locked)
Identifying adversary behavior4m 21s
-
(Locked)
Discovering indicators of compromise4m 32s
-
(Locked)
Challenge: The cyber kill chain1m 22s
-
(Locked)
Solution: The cyber kill chain2m 33s
-
-
-
-