Internal Pivot, Network Enumeration, & Lateral Movement

Joff Thyer // Picture a scenario whereby you are involved in an internal network penetration test. Perhaps you have succeeded with a spear-phishing campaign and landed on an internal system, […]

Read the entire post here