-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Incident Response for Windows
By :

Earlier, we mentioned the cyclical nature of a number of actions performed during the intermediate stages of an attack. The point is that after the initial access, threat actors have very limited access to both the victim’s infrastructure and the data necessary to successfully develop the attack and achieve their final goals.
As threat actors gradually move from host to host, they gather more and more useful information and new opportunities arise for them to both spread further and effectively achieve their goals. In addition, new hosts may prove to be attractive targets for adversaries to gain a foothold or collect specific data. This is especially true for groups interested in espionage or during the investigation of internal systems. Such attacks usually evolve slowly, as the threat actors try to proceed with extreme caution and there may be several intermediate hosts in the process.
Thus, the intermediate stages of an attack –...
Change the font size
Change margin width
Change background colour