Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens to move laterally.
Unlock Full Content
Premium members get access to real-world attack examples, comprehensive defense strategies, detection methods, and knowledge quizzes for all techniques.