Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE

ON-DEMAND WEBINAR

Lateral Movement Techniques and How to Detect Them

Duration: 40 Minutes

Lateral movement techniques are leveraged by attackers to move throughout a network, slowly increasing privileges until they achieve their end goal. Pass-the-Hash, Pass-the-Ticket, and Overpass-the-Hash are three of the most common lateral movement methods performed on Windows systems.  

In this webinar, General Manager of Products, Jeff Warren takes a deep dive into these attack methods. View the recording to learn:

  • What to look for and how to understand Active Directory lateral movement attacks
  • Practical approaches on how to detect them
JEFF WARREN
GM of Products Stealthbits Technologies

    View the webinar

    Landing

    © 2022 Stealthbits Technologies, Inc.