Post-compromise technique where attackers move through a network from one system to another, escalating privileges and expanding their access to reach high-value targets.
Tools / Indicators
MITRE ATT&CK
Related Attacks