In this section, we will explore the phases of attack after the initial foothold in an organization. We will discuss conducting recon from that unique viewpoint to discover new hosts, lateral movement with the details we already have, and compromising accounts with higher privileges to allow for even more movement into the network. We wrap up with a discussion on maintaining access to our compromised resources.
This part of the book comprises the following chapters: