Offensive Security
Lateral Movement Techniques
Moving through a network after initial compromise.
ABOUT THIS MODULE
What you will learn in this module.
Moving through a network after initial compromise. Routing traffic through compromised hosts. Accessing internal subnets.
OUTCOMES
What you will be able to do.
Routing traffic through compromised hosts
Accessing internal subnets
TOOLS & STACK
What you will work with.
Proxychains
Impacket
Sshuttle