Room progress ( 0% )
Task 1Introduction
Task 2Moving Through the Network
Task 3Spawning Processes Remotely
Task 4Moving Laterally Using WMI
Task 5Use of Alternate Authentication Material
Task 6Abusing User Behaviour
Task 7Port Forwarding
Task 8Conclusion
Ready to learn Cyber Security? Create your free account today!
The Lateral Movement and Pivoting room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in