Attack Flows
🕸️

Lateral Movement

Post-compromise technique where attackers move through a network from one system to another, escalating privileges and expanding their access to reach high-value targets.

Severity 4/5 T1021 6 phases
·

Related Attacks