Go To Home

Top Lateral Movement Techniques – The Red Team Edition

Lateral Movement Techniques

Inside You’ll Find

18 lateral movement techniques used by our red-team to break into some of the world’s most well-defended networks. You will learn:

  • The attacker’s view of each technique. Understand how adversaries use them to move laterally in your network undetected.
  • Practical recommendations on how you can prevent attackers from executing these techniques.
  • ‘Effort to Exploit’ and ‘Effort to Defend’ ratings for each technique. Use these to prioritize network changes for prevention.
  • Easy to implement deception plays for techniques that are hard or impractical to prevent.


Grab Your Copy

Much dreaded form coming up
We hate forms too but this one will help us get to know each other. Promise
Go to home

Simple solutions for detecting and containing threats. Working with us does not break the bank or your spirit. We’re the company of choice for offensive security teams with a Net Promoter Score of 70+.

© 2015-2021 Smokescreen. All rights reserved.

Solutions For
Web Application AttacksLateral MovementRansomware AttacksTargeted ThreatsSocial EngineeringMalware-less Attacks