Quinton has been asked to analyze the TTPs of an attack that recently occurred and prepare an SOP to hunt for future treats. When researching the recent attack, Quinton discovered that after penetrating the system, the threat actor moved through the network using elevated credentials. Which technique was the threat actor using to move through the network?

Respuesta :

There are different kinds of movement. The technique that was the threat actor using to move through the network is Lateral Movement.

Network Lateral Movement, is simply known as a method used by cyber attackers, or threat actors, to quickly move through a network as they search for the key data and assets that are the main hit or target of their attack work.

  • In this kind of movement, when an attacker do compromise or have the power or control of one asset within a network, it quickly transport or moves on from that device to others while still within the same network.

 Examples of Lateral movement are:

  • Pass the hash (PtH)
  • Pass the ticket (PtT)
  • Exploitation of remote services, etc.

See full question below

Quinton has been asked to analyze the TTPs of an attack that recently occurred and prepare an SOP to hunt for future treats. When researching the recent attack, Quinton discovered that after penetrating the system, the threat actor moved through the network using elevated credentials. Which technique was the threat actor using to move through the network?

A. Initial Compromise

B. Lateral movement

C. Privilege escalation

D. Data exfiltration

Learn more about Lateral movement from

https://brainly.com/question/1245899

ACCESS MORE