{"id":1247,"date":"2023-04-27T22:16:14","date_gmt":"2023-04-27T20:16:14","guid":{"rendered":"https:\/\/counterintelligence.pl\/?p=1247"},"modified":"2023-04-27T22:16:16","modified_gmt":"2023-04-27T20:16:16","slug":"atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting","status":"publish","type":"post","link":"https:\/\/counterintelligence.pl\/en\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/","title":{"rendered":"Attackers in the bottleneck - lateral movements and threat hunting"},"content":{"rendered":"<p><a href=\"https:\/\/counterintelligence.pl\/en\/2022\/03\/hunting-zaprzegajac-cti-do-pracy\/\">Threat hunting is not an easy task<\/a>. The multitude of ways in which attackers can implement the next stages of the attack makes the detection scenarios seem endless. That is why it is so important to properly prioritize and focus on the stages of the intrusion during which attackers have less room to manoeuvre. And the ideal attack phase for this purpose is the so-called \"lateral movements\", i.e. the stage when attackers expand access to the environment by connecting to more devices. Why this phase? This is due to the amount of technique that the attacker can use. If we wanted to present the number of possible combinations of actions at subsequent stages of intrusion, our graphics would resemble an hourglass. In terms of ways to deliver malicious files or scripts, we can list dozens, if not hundreds, of techniques. Similarly in the case of maintaining access, or collecting and exfiltrating data. However, when an attacker wants to take control of subsequent workstations or servers, the matter does not look so bright anymore. Let's look at the number of techniques contained in MITER ATT&amp;CK, starting with Initial Access, i.e. when malicious actions against the victim begin:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/image.png?resize=559%2C424&#038;ssl=1\" alt=\"\" class=\"wp-image-1253\" width=\"559\" height=\"424\" srcset=\"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/image.png?w=559&amp;ssl=1 559w, https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/image.png?resize=300%2C228&amp;ssl=1 300w, https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/image.png?resize=16%2C12&amp;ssl=1 16w\" sizes=\"auto, (max-width: 559px) 100vw, 559px\" \/><\/figure>\n<\/div>\n\n\n<p>The number of techniques therefore increases quickly at the environmental access and privilege elevation stages, drops significantly during horizontal movements in the environment, and then increases again in terms of data acquisition and communication with infected hosts. These figures do not tell the whole picture. If we look at the example of the Initial Access tactic, we will find two inconspicuous entries there <a href=\"https:\/\/attack.mitre.org\/techniques\/T1566\/002\/\">Spearphishing Link<\/a> and <a href=\"https:\/\/attack.mitre.org\/techniques\/T1566\/001\/\">Spearphishing Attachment<\/a>. And yet all kinds of phishing emails constitute a significant part of all access attempts and examples of procedures related to the use of various types of attachments, hiding malicious files can be mentioned almost endlessly. Still, in the general outline, we see clear trends and narrowing in the stage of movements in the environment. Why is it like that?<\/p>\n\n\n\n<p>This is because an attacker trying to send malicious tools to his victim or exploit a vulnerability acts unilaterally, the target is only the recipient of the ability. In the case of movements in the environment and attempts to gain access to more machines, the situation will look completely different. The attacker may try to reuse the same techniques and, for example: <a href=\"https:\/\/attack.mitre.org\/techniques\/T1534\/\">distribute phishing internally<\/a> or <a href=\"https:\/\/attack.mitre.org\/techniques\/T1534\/\">exploit vulnerabilities in found ones<\/a> services, however, this will not be very effective. A much more efficient method is to use already existing methods of remote management of other machines, such as those used by administrators. And this already requires that both the device from which the attacker will operate and the target device be configured to use the given tools with all the consequences related to the availability of configured tools and the possibility of observation based on standard system logs. This is what we might consider the \"standard\" attack scheme, when the attacker obtains information from the environment, such as passwords and user logins, and then uses them to authenticate access to subsequent machines. And using this common methodology, its range of capabilities is relatively easy to predict. To illustrate this situation, let's use a cheatsheet which is a poster by <a href=\"https:\/\/www.sans.org\/posters\/hunt-evil\/\">SANS &quot;Hunt Evil<\/a>&#8222;:<\/p>\n\n\n\n<div\n    class='wp-block-pdfp-pdf-poster  alignnone'\n    id='block-2'\n    data-attributes='{&quot;uniqueId&quot;:&quot;pdfp1&quot;,&quot;file&quot;:&quot;https:\\\/\\\/counterintelligence.pl\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/SANS_DFPS_FOR508_v4.10_02-23-1.pdf&quot;,&quot;title&quot;:&quot;SANS Hunt Evil&quot;,&quot;height&quot;:&quot;842px&quot;,&quot;width&quot;:&quot;100%&quot;,&quot;print&quot;:false,&quot;fullscreenButton&quot;:&quot;1&quot;,&quot;fullscreenButtonText&quot;:&quot;View Fullscreen&quot;,&quot;newWindow&quot;:false,&quot;showName&quot;:false,&quot;downloadButton&quot;:false,&quot;downloadButtonText&quot;:&quot;Download File&quot;,&quot;protect&quot;:false,&quot;onlyPDF&quot;:false,&quot;defaultBrowser&quot;:false,&quot;thumbMenu&quot;:false,&quot;initialPage&quot;:0,&quot;sidebarOpen&quot;:false,&quot;lastVersion&quot;:false,&quot;hrScroll&quot;:0,&quot;alert&quot;:true,&quot;btnStyles&quot;:{&quot;background&quot;:&quot;#1e73be&quot;,&quot;color&quot;:&quot;#fff&quot;,&quot;fontSize&quot;:&quot;1rem&quot;,&quot;padding&quot;:{&quot;top&quot;:10,&quot;right&quot;:20,&quot;bottom&quot;:10,&quot;left&quot;:10}},&quot;popupOptions&quot;:{&quot;enabled&quot;:0,&quot;text&quot;:&quot;Open PDF&quot;,&quot;triggerType&quot;:&quot;button&quot;,&quot;image&quot;:&quot;&quot;,&quot;imageHeight&quot;:&quot;200px&quot;,&quot;imageWidth&quot;:&quot;300px&quot;,&quot;imagePdfIcon&quot;:true,&quot;triggerAlignment&quot;:&quot;center&quot;,&quot;btnStyle&quot;:{&quot;background&quot;:&quot;#1e73be&quot;,&quot;color&quot;:&quot;#fff&quot;,&quot;fontSize&quot;:&quot;1rem&quot;,&quot;padding&quot;:{&quot;top&quot;:10,&quot;right&quot;:20,&quot;bottom&quot;:10,&quot;left&quot;:10}}},&quot;actionsPosition&quot;:&quot;top&quot;,&quot;socialShare&quot;:{&quot;enabled&quot;:false,&quot;facebook&quot;:false,&quot;twitter&quot;:false,&quot;linkedin&quot;:false,&quot;pinterest&quot;:false,&quot;position&quot;:&quot;top&quot;},&quot;adobeEmbedder&quot;:false,&quot;align&quot;:&quot;none&quot;,&quot;alignment&quot;:&quot;left&quot;,&quot;titleFontSize&quot;:&quot;16px&quot;,&quot;isHideRightToolbar&quot;:false,&quot;additional&quot;:{&quot;ID&quot;:&quot;&quot;,&quot;Class&quot;:&quot;&quot;,&quot;CSS&quot;:&quot;&quot;},&quot;adobeOptions&quot;:{&quot;showDownloadPDF&quot;:true,&quot;showPrintPDF&quot;:true,&quot;showAnnotationTools&quot;:true,&quot;showFullScreen&quot;:false,&quot;embedMode&quot;:&quot;SIZED_CONTAINER&quot;},&quot;popupBtnStyle&quot;:{&quot;background&quot;:&quot;#2271b1&quot;,&quot;color&quot;:&quot;#fff&quot;,&quot;padding&quot;:{&quot;top&quot;:10,&quot;right&quot;:20,&quot;bottom&quot;:10,&quot;left&quot;:10}},&quot;popupBtnText&quot;:&quot;Open Document&quot;,&quot;CSS&quot;:&quot;&quot;,&quot;TrpContentRestriction&quot;:{&quot;restriction_type&quot;:&quot;exclude&quot;,&quot;selected_languages&quot;:[],&quot;panel_open&quot;:true},&quot;isPremium&quot;:false}'\n    style=\"text-align: left\">\n    \n        <iframe loading=\"lazy\" title=\"SANS Hunt Evil\" style=\"border:0;\" width=\"100%\" height=\"800px\" class=\"pdfp_unsupported_frame\" src=\"\/\/docs.google.com\/gview?embedded=true&url=https:\/\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/SANS_DFPS_FOR508_v4.10_02-23-1.pdf\"><\/iframe>\n\n    <\/div>\n\n\n\n\n<p>So there are actually seven main techniques that take advantage of the built-in functionality of Windows. Let's look at the practice of analyzing one of them. As an example, we will use a remote desktop, i.e. the popular RDP. In combination with obtaining user account data, it is a very convenient method of vertical movements, allowing you to establish interactive connections with subsequent hosts. Since it is a remote desktop, the attacker also has the option of using a graphical interface and conveniently use mouse and desktop control to achieve his objectives, such as searching for files on the disk, copying them and compressing them in archives, or data exfiltration by logging in via an email browser and sending files. Defenders can therefore face a difficult task - the need to detect activity that looks like a simple login to another machine by one of the users. What traces and artifacts can help us in this case? Detection will consist of two components - detecting RDP usage and analyzing user activity to determine if they should connect to a given machine. In terms of the first of these components, information will be provided primarily by artifacts showing the launch of processes related to the remote desktop client - mstsc.exe, and on the side of the device with which the attacker would connect to functional tools - rdpclip.exe (remote desktop clipboard) and tstheme.exe (system shell themes after connection). On the other hand, the Security and System event logs <strong>RDPClient\/Operational<\/strong> they allow you to specify the directions of connections and the used user accounts. In particular, it will be event 4648, i.e. logging in with user data. <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/threat-protection\/auditing\/event-4648\">Example event<\/a> from Microsoft documentation:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"873\" src=\"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/image-1.png?resize=640%2C873&#038;ssl=1\" alt=\"\" class=\"wp-image-1260\" srcset=\"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/image-1.png?w=694&amp;ssl=1 694w, https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/image-1.png?resize=220%2C300&amp;ssl=1 220w, https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/image-1.png?resize=9%2C12&amp;ssl=1 9w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p>We will find here not only information about the user but also the target device and the process that triggered the event, which facilitates analysis. In the diary <strong>RDPClient\/Operational<\/strong> however, it is worth paying attention to the events with identifiers 1024 and 1102. The first one is related to the ActiveX functionality, which allows you to apply additional scripts and in its content you will find the entry &quot;RDP ClientActiveX is trying to connect to the server (host name)&quot;. 1102, in turn, is information about establishing a connection where information about the destination IP address will appear. We will be able to observe these events on the side of the device initiating the connection, what about the target computer? There, in the Security log, we should look for traces of type 10 login, i.e. remote interactive login, which will appear in <a href=\"https:\/\/www.ultimatewindowssecurity.com\/securitylog\/encyclopedia\/event.aspx?eventid=4624\">event 4624<\/a>. Additionally, in the case of remote desktop, a user can disconnect and reconnect within the created session and these reconnections leave events with ID <a href=\"https:\/\/www.ultimatewindowssecurity.com\/securitylog\/encyclopedia\/event.aspx?eventid=4778\">4778<\/a>. And on the other hand, disconnecting will leave a trace about the ID <a href=\"https:\/\/www.ultimatewindowssecurity.com\/securitylog\/encyclopedia\/event.aspx?eventid=4779\">4779<\/a>. The content of all these events should show us the IP address and username of the user who logged in to the station. <\/p>\n\n\n\n<p>I will not try to summarize the rest of the poster here, instead I would like to point out why I like the methodology presented on it. First of all, the artifacts we discussed in the example of remote desktop are specific to Windows telemetry - both event logs and evidence of program launches via prefetch files. So we do not need to use any additional tools like EDR to start the analysis. In addition, the sources of artifacts are divided into three categories - event logs, registry, and file system. Thus, combining the fact that there are relatively few horizontal movement techniques, we can focus on specific sources of detection. Of course, this is a great simplification of the problem - just launching tools related to remote desktop or events indicating connection to the session will not be enough to create a detection that will not cause a false positive result. However, understanding the artifacts attackers will cause in the environment is the first step to establishing normal behavior and detecting deviations, and then actually malicious activity. Having knowledge and visibility of what stations users should connect to, when they use them, how often they disconnect and reconnect during a session, or finally observing the actions of users who are the first in the history of their work at two in the morning, we can start verifying individual events,<\/p>\n\n\n\n<p>From a threat hunting perspective, lateral movements are a special phase in many ways. They prove that the attacker has already gained access to the environment, and at the same time has not yet achieved his goals, perhaps just begins to recon the infrastructure. Therefore, a limited number of techniques is an opportunity for defenders to take advantage of a stressful situation for attackers when, before performing the assumed tasks, they can no longer avoid leaving traces resulting from the normal operation of the system, such as artifacts indicating the launch of individual tools or logging on workstations. This translates into more stressful situations for attackers and reverses the sometimes-repeated phrase \"attackers only have to succeed once, defenders have to succeed every time.\" When operating in the environment, defenders only need to \u201cget it once\u201d because a single detection can lead to cutting off access to the environment and trace how this access was obtained in the first place. The seven indicated techniques do not exhaust all the possibilities of moving around in the environment, but by ensuring our visibility and detection capabilities, we radically limit the possibilities of attackers, forcing them to use more complex and thus less reliable ones. And the more the attackers' hands are tied and the more complicated actions they have to perform, the greater the chance of making a mistake.<\/p>","protected":false},"excerpt":{"rendered":"<p>Threat hunting nie jest prostym zadaniem. Mnogo\u015b\u0107 sposob\u00f3w w jaki napastnicy mog\u0105 realizowa\u0107 kolejne etapy ataku sprawia, \u017ce scenariusze detekcji wydaj\u0105 si\u0119 niesko\u0144czone. Dlatego tak wa\u017cne jest w\u0142a\u015bciwe okre\u015blenie priorytet\u00f3w i skupienie si\u0119 na etapach w\u0142amania podczas kt\u00f3rych atakuj\u0105cy maj\u0105 mniejsze mo\u017cliwo\u015bci manewru. I w\u0142a\u015bnie idealn\u0105 faz\u0105 ataku dla tego [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1266,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[98,6],"tags":[99,113,114,57,41],"class_list":["post-1247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dfir","category-threat-intelligence","tag-dfir","tag-lateral-movements","tag-rdp","tag-threat-hunting","tag-threat-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Atakuj\u0105cy w w\u0105skim gardle - lateral movements i threat hunting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/counterintelligence.pl\/en\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Atakuj\u0105cy w w\u0105skim gardle - lateral movements i threat hunting\" \/>\n<meta property=\"og:description\" content=\"Threat hunting nie jest prostym zadaniem. Mnogo\u015b\u0107 sposob\u00f3w w jaki napastnicy mog\u0105 realizowa\u0107 kolejne etapy ataku sprawia, \u017ce scenariusze detekcji wydaj\u0105 si\u0119 niesko\u0144czone. Dlatego tak wa\u017cne jest w\u0142a\u015bciwe okre\u015blenie priorytet\u00f3w i skupienie si\u0119 na etapach w\u0142amania podczas kt\u00f3rych atakuj\u0105cy maj\u0105 mniejsze mo\u017cliwo\u015bci manewru. I w\u0142a\u015bnie idealn\u0105 faz\u0105 ataku dla tego [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/counterintelligence.pl\/en\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/\" \/>\n<meta property=\"og:site_name\" content=\"counterintelligence.pl\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-27T20:16:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-27T20:16:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/Screenshot-2023-04-27-at-22.00.34-1024x1024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kamil Bojarski\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lawsecnet\" \/>\n<meta name=\"twitter:site\" content=\"@lawsecnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kamil Bojarski\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/\"},\"author\":{\"name\":\"Kamil Bojarski\",\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/#\\\/schema\\\/person\\\/a2bd0e683e8f31df48bd02f45508e8ba\"},\"headline\":\"Atakuj\u0105cy w w\u0105skim gardle &#8211; lateral movements i threat hunting\",\"datePublished\":\"2023-04-27T20:16:14+00:00\",\"dateModified\":\"2023-04-27T20:16:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/\"},\"wordCount\":1578,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/#\\\/schema\\\/person\\\/a2bd0e683e8f31df48bd02f45508e8ba\"},\"image\":{\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/counterintelligence.pl\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Screenshot-2023-04-27-at-22.00.34.png?fit=1528%2C1526&ssl=1\",\"keywords\":[\"dfir\",\"lateral movements\",\"rdp\",\"threat hunting\",\"threat intelligence\"],\"articleSection\":[\"DFIR\",\"Threat Intelligence\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/\",\"url\":\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/\",\"name\":\"Atakuj\u0105cy w w\u0105skim gardle - lateral movements i threat hunting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/counterintelligence.pl\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Screenshot-2023-04-27-at-22.00.34.png?fit=1528%2C1526&ssl=1\",\"datePublished\":\"2023-04-27T20:16:14+00:00\",\"dateModified\":\"2023-04-27T20:16:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/counterintelligence.pl\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Screenshot-2023-04-27-at-22.00.34.png?fit=1528%2C1526&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/counterintelligence.pl\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Screenshot-2023-04-27-at-22.00.34.png?fit=1528%2C1526&ssl=1\",\"width\":1528,\"height\":1526},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/2023\\\/04\\\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/counterintelligence.pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Atakuj\u0105cy w w\u0105skim gardle &#8211; lateral movements i threat hunting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/#website\",\"url\":\"https:\\\/\\\/counterintelligence.pl\\\/\",\"name\":\"counterintelligence.pl\",\"description\":\"Threat Inteliigence \\\/ OSINT \\\/ NETSEC \\\/ NATSEC\",\"publisher\":{\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/#\\\/schema\\\/person\\\/a2bd0e683e8f31df48bd02f45508e8ba\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/counterintelligence.pl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/counterintelligence.pl\\\/#\\\/schema\\\/person\\\/a2bd0e683e8f31df48bd02f45508e8ba\",\"name\":\"Kamil Bojarski\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/counterintelligence.pl\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/ci_hor.png?fit=1521%2C721&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/counterintelligence.pl\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/ci_hor.png?fit=1521%2C721&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/counterintelligence.pl\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/ci_hor.png?fit=1521%2C721&ssl=1\",\"width\":1521,\"height\":721,\"caption\":\"Kamil Bojarski\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/counterintelligence.pl\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/ci_hor.png?fit=1521%2C721&ssl=1\"},\"sameAs\":[\"https:\\\/\\\/counterintelligence.pl\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/kamil-bojarski\\\/\",\"https:\\\/\\\/x.com\\\/lawsecnet\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attackers in the bottleneck - lateral movements and threat hunting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/counterintelligence.pl\/en\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/","og_locale":"en_US","og_type":"article","og_title":"Atakuj\u0105cy w w\u0105skim gardle - lateral movements i threat hunting","og_description":"Threat hunting nie jest prostym zadaniem. Mnogo\u015b\u0107 sposob\u00f3w w jaki napastnicy mog\u0105 realizowa\u0107 kolejne etapy ataku sprawia, \u017ce scenariusze detekcji wydaj\u0105 si\u0119 niesko\u0144czone. Dlatego tak wa\u017cne jest w\u0142a\u015bciwe okre\u015blenie priorytet\u00f3w i skupienie si\u0119 na etapach w\u0142amania podczas kt\u00f3rych atakuj\u0105cy maj\u0105 mniejsze mo\u017cliwo\u015bci manewru. I w\u0142a\u015bnie idealn\u0105 faz\u0105 ataku dla tego [&hellip;]","og_url":"https:\/\/counterintelligence.pl\/en\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/","og_site_name":"counterintelligence.pl","article_published_time":"2023-04-27T20:16:14+00:00","article_modified_time":"2023-04-27T20:16:16+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/Screenshot-2023-04-27-at-22.00.34-1024x1024.png","type":"image\/png"}],"author":"Kamil Bojarski","twitter_card":"summary_large_image","twitter_creator":"@lawsecnet","twitter_site":"@lawsecnet","twitter_misc":{"Written by":"Kamil Bojarski","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/#article","isPartOf":{"@id":"https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/"},"author":{"name":"Kamil Bojarski","@id":"https:\/\/counterintelligence.pl\/#\/schema\/person\/a2bd0e683e8f31df48bd02f45508e8ba"},"headline":"Atakuj\u0105cy w w\u0105skim gardle &#8211; lateral movements i threat hunting","datePublished":"2023-04-27T20:16:14+00:00","dateModified":"2023-04-27T20:16:16+00:00","mainEntityOfPage":{"@id":"https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/"},"wordCount":1578,"commentCount":1,"publisher":{"@id":"https:\/\/counterintelligence.pl\/#\/schema\/person\/a2bd0e683e8f31df48bd02f45508e8ba"},"image":{"@id":"https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/Screenshot-2023-04-27-at-22.00.34.png?fit=1528%2C1526&ssl=1","keywords":["dfir","lateral movements","rdp","threat hunting","threat intelligence"],"articleSection":["DFIR","Threat Intelligence"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/","url":"https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/","name":"Attackers in the bottleneck - lateral movements and threat hunting","isPartOf":{"@id":"https:\/\/counterintelligence.pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/#primaryimage"},"image":{"@id":"https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/Screenshot-2023-04-27-at-22.00.34.png?fit=1528%2C1526&ssl=1","datePublished":"2023-04-27T20:16:14+00:00","dateModified":"2023-04-27T20:16:16+00:00","breadcrumb":{"@id":"https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/#primaryimage","url":"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/Screenshot-2023-04-27-at-22.00.34.png?fit=1528%2C1526&ssl=1","contentUrl":"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/Screenshot-2023-04-27-at-22.00.34.png?fit=1528%2C1526&ssl=1","width":1528,"height":1526},{"@type":"BreadcrumbList","@id":"https:\/\/counterintelligence.pl\/2023\/04\/atakujacy-w-waskim-gardle-lateral-movements-i-threat-hunting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/counterintelligence.pl\/"},{"@type":"ListItem","position":2,"name":"Atakuj\u0105cy w w\u0105skim gardle &#8211; lateral movements i threat hunting"}]},{"@type":"WebSite","@id":"https:\/\/counterintelligence.pl\/#website","url":"https:\/\/counterintelligence.pl\/","name":"counterintelligence.pl","description":"Threat Inteliigence \/ OSINT \/ NETSEC \/ NATSEC","publisher":{"@id":"https:\/\/counterintelligence.pl\/#\/schema\/person\/a2bd0e683e8f31df48bd02f45508e8ba"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/counterintelligence.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/counterintelligence.pl\/#\/schema\/person\/a2bd0e683e8f31df48bd02f45508e8ba","name":"Kamil Bojarski","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/11\/ci_hor.png?fit=1521%2C721&ssl=1","url":"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/11\/ci_hor.png?fit=1521%2C721&ssl=1","contentUrl":"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/11\/ci_hor.png?fit=1521%2C721&ssl=1","width":1521,"height":721,"caption":"Kamil Bojarski"},"logo":{"@id":"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/11\/ci_hor.png?fit=1521%2C721&ssl=1"},"sameAs":["https:\/\/counterintelligence.pl","https:\/\/www.linkedin.com\/in\/kamil-bojarski\/","https:\/\/x.com\/lawsecnet"]}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/counterintelligence.pl\/wp-content\/uploads\/2023\/04\/Screenshot-2023-04-27-at-22.00.34.png?fit=1528%2C1526&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/counterintelligence.pl\/en\/wp-json\/wp\/v2\/posts\/1247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/counterintelligence.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/counterintelligence.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/counterintelligence.pl\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/counterintelligence.pl\/en\/wp-json\/wp\/v2\/comments?post=1247"}],"version-history":[{"count":13,"href":"https:\/\/counterintelligence.pl\/en\/wp-json\/wp\/v2\/posts\/1247\/revisions"}],"predecessor-version":[{"id":1268,"href":"https:\/\/counterintelligence.pl\/en\/wp-json\/wp\/v2\/posts\/1247\/revisions\/1268"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/counterintelligence.pl\/en\/wp-json\/wp\/v2\/media\/1266"}],"wp:attachment":[{"href":"https:\/\/counterintelligence.pl\/en\/wp-json\/wp\/v2\/media?parent=1247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/counterintelligence.pl\/en\/wp-json\/wp\/v2\/categories?post=1247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/counterintelligence.pl\/en\/wp-json\/wp\/v2\/tags?post=1247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}