From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Introduction to lateral movement and exfiltration

Introduction to lateral movement and exfiltration

From the course: Complete Guide to Cybersecurity: A Practical Approach

Introduction to lateral movement and exfiltration

- So let's go over what is lateral movement and then we're going to talk about exfiltration in a few seconds later. Whenever you compromise a system, let's say that you have a system, I'm going to put here V for victim, that you already found some vulnerabilities, that you have a foothold of the system, you may want to actually then do additional reconnaissance to find other systems, and I'm going to put here A and B, you know, within the company, or the organization, or the network, and potentially find whether there are vulnerabilities, open ports, additional information that you can actually extract from them, or that you are already having some information and some sensitive data that you want to then transfer to another system to then perhaps that system has access to the internet or to other areas of the network, and this original system did not. And in that case, you perform this lateral movement or pivoting, that's another term for it, to then exfiltrate data to the internet…

Contents