From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,800 courses taught by industry experts.

Introduction to lateral movement and exfiltration

Introduction to lateral movement and exfiltration

From the course: Certified Ethical Hacker (CEH)

Introduction to lateral movement and exfiltration

- So let's go over what is lateral movement, and then we're going to talk about exfiltration in a few seconds later. Whenever you compromise a system, let's say that you have a system, I'm going to put here V for victim, that you already found some vulnerabilities, that you have a foothold of the system. You may want to actually then do additional reconnaissance to find other systems that I'm going to put here, A and B within the the company or the organization or the network, and potentially find whether there are vulnerabilities, open ports, additional information that you can actually extract from them, or that you're already having some information and some sensitive data that you want to then transfer to another system to then perhaps that system has access to the internet or to other areas of the network. And this original system did not. And in that case, you perform this lateral movement or pivoting, that's another term for it to then exfiltrate data to the internet or to a…

Contents