Detecting AD Lateral Movement (TryHackMe)
Mar 20 · 32 min read · Introduction
In an AD environment, attackers who compromise a single account rarely stop there. They use built-in protocols like SMB and RDP to move from the initial foothold to servers that hold what