Propagation Phase
Done using a mixture of methodologies:
Credential exploitation.
Direct usage or by using allowed applications.
Impersonating users or applications.
Similar to credential exploitations but more advanced based on acquire knowledge (licit behavior).
Requires time to learn and mimic licit behavior.
Time, applications, and traffic patterns.
Vulnerability exploitation.
Inside a protected domain, systems are many times considered in a secure zone.
Less maintained and legacy OS/applications may be required to run (no patching).
A broader range of vulnerabilities.
Last updated