Detecting lateral movement
Typically, the endpoint first compromised by an attacker isn't their final objective
Processes
Once an adversary has gained access to a machine, they perform reconnaissance
Explicit credentials use (Windows)
Windows provides users with the ability to authenticate using explicit credentials
Hunting for registry and system file changes
The Windows registry and system files have a lot of power on the system
Registry persistence mechanisms
Registry changes
Fileless malware
Fileless malware has become more common lately to avoid antivirus detection
Enabling registry auditing
Checking file timestamps
File timestamps can be a valuable indicator of compromise when system files are modified
Hunting for system file changes
Last updated