Privilege Escalation & Lateral Movement

  • Home
  • Privilege Escalation & Lateral Movement

Pentest team attempt to gain administrator-level access to target systems and leverage collected data to move laterally throughout the network, with a focus on obtaining access to critical systems and data

Related Posts

Social Engineering Based Testing

End users are the weakest link of cybersecurity control chain. An assessment is conducted to

Read More

Internal Infrastructure Pentest

Pentest scenarios based on an internal ‘attacker’, like a legitimate infrastructure user or visitor with

Read More

External Infrastructure Pentest

Pentest conducted through the Internet by an ‘attacker’ with no preliminary knowledge of your system

Read More