Abstract

Network Lateral Movement, or what is more commonly referred to simply as, “Lateral Movement”, refers to the techniques cyber attackers, or “threat actors”, use to progressively move through a network as they search for the key data and assets that are ultimately the target of their attack campaigns.

In this chapter we are going to discover the following topics:

- ARP spoofing using arpspoof

- ARP spoofing using MITMf

- Bypassing HTTPS

- Session hijacking

- Code injection

- MyFirstPacket

- Sending and receiving

- Layering

- Viewing the packet

- Classical attacks

1.Man-in-the–middle attacks

In…


In a given year, SOCs will be tracking hundreds of or even a larger number of cases, vulnerabilities, and threats. In each occasion, the SOC must render a response that is proper, given the criticality of the circumstance. Subsequently, most of our investigation should be standard and not cause for a crisis. In our tenth and last methodology, we inspect procedures for tending to incident in an expert, dependable, and compelling way.
In like manner, we examine how to track incidents from cradle to grave.

When there is a significant incident, everyone’s eyes are on the SOC. Most parts of…

Mohamed Marrouchi

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store