ETHICAL
HACKING
PERFORMING LATERAL
MOVEMENT
2
INTRODUCTION
• Lateral movement is a means to an end; a
technique used to identify, gain access to and
exfiltration of sensitive data.
3
DEFINITION OF LATERAL MOVEMENT
Lateral movement refers to the techniques
that a cyber attacker uses, after gaining
initial access, to move deeper into a
network in search of sensitive data and
other high-value assets.
4
LATERAL MOVEMENT PROCEDURE STEPS
Lateral movement can be divided into these five steps:
External reconnaissance
Internal reconnaissance
Initial infiltration
Stealing credentials
5
LATERAL MOVEMENT TECHNIQUES
“Lateral movement” is a technique used by cybercriminals to systematically
move through a network in search of data. The various techniques are listed:
Token stealing
Stolen credentials
Logon scripts 6
TOKEN STEALING
This is a new technique that hackers have been reported to be using for lateral
movement once they get into a network.
It can be performed without detection, often with the use of PowerShell.
7
STOLEN CREDENTIALS
• Stolen credentials are even more common than token stealing.
• While organizations have responded to the attack environment by investing in
anti-malware capabilities, attackers have changed their focus a bit and have
shifted more to the fundamental actions within environments.
8
LOGON SCRIPTS
• Windows uses logon scripts whenever users log into a computer system.
• These scripts can execute other programs, perform administrative functions and
send information to login servers on the network.
• If attackers can access these scripts, they can insert their own pieces of code for
continued persistence of a compromised system.
9
HOW TO DETECT LATERAL MOVEMENT
The various techniques to detect lateral movement are listed:
Alert Fatigue
Network increases visibility of attack
Threat hunting
10
ALERT FATIGUE
The overabundance of security alerts and false positives are an unfortunate
reality, causing overworked and undertrained analysts to become
desensitized to the types of alerts triggered by lateral movement attacks, such
as policy violations.
11
NETWORK INCREASES VISIBILITY OF ATTACK
• Network-based characteristics before a lateral movement attack can help
identify one as it happens.
• Packet analysis tools can help identify network characteristics, which can
then help security analysts answer questions about a network: which devices
are communicating, how they are identified, where they are located, when
real communication happens.
12
THREAT HUNTING
Threat hunting is an important part of detecting lateral movement, as it empowers
security analysts to proactively investigate network activity to identify anomalies
other detection methods don’t catch.
13
PRACTICES TO PREVENT LATERAL
MOVEMENT
There are several practices to prevent and protect lateral movement:
Least privilege
Whitelisting
EDR security
Password management
14
Multi-factor authentication
1
THANK YOU!
CONTACT US!
Phone:
+91 – 72597-87316
Email:
SUPPORT@ETHICALBYTE.IN