one of the most effective ways to gain remote access to an environment.
Misconfigured network security rules often provide multiple paths for threat traversal. When systems can communicate freely in a network, they can quickly exchange information. This includes a threat's traffic. It is prevalent for an organization to configure externally facing traffic rules and leave internal network communications wide open. It is also common for credentials to be stored in cleartext in publicly available locations on a network. These credentials maybe user or administrative. Either way, when
threats use valid credentials, they look and feel like insiders. It can be very difficult fora Blue Team to distinguish between a threat and a valid user. These are important measurements of security operations capability.
Share with your friends: