Internal Pivot, Network Enumeration, & Lateral Movement
25 April 2016 at 12:27
Joff Thyer // Picture a scenario whereby you are involved in an internal network penetration test. Perhaps you have succeeded with a spear-phishing campaign and landed on an internal system, [β¦]
The post Internal Pivot, Network Enumeration, & Lateral Movement appeared first on Black Hills Information Security, Inc..