• Online, Self-Paced
Course Description

In this Challenge Lab, you will learn about the attacker tactic known as lateral movement and how attackers might perform a lateral movement operation against a network. First, you will gain remote control access over a network boundary server to inject meterpreter, and then you will use meterpreter to set up a routing function to redirect additional attack functions to a private network. Next, you will perform network reconnaissance to locate an internal target supporting a telnet service. Finally, you will gain access to the internal system through a telnet shell. Note: Once you begin the Challenge Lab, you will not be able to pause, save, or exit and then return to your Challenge Lab. Please ensure that you have set aside enough time to complete the Challenge Lab before you start.

Learning Objectives

In this Challenge Lab, you will learn about the attacker tactic known as lateral movement and how attackers might perform a lateral movement operation against a network. First, you will gain remote control access over a network boundary server to inject meterpreter, and then you will use meterpreter to set up a routing function to redirect additional attack functions to a private network. Next, you will perform network reconnaissance to locate an internal target supporting a telnet service. Finally, you will gain access to the internal system through a telnet shell. Note: Once you begin the Challenge Lab, you will not be able to pause, save, or exit and then return to your Challenge Lab. Please ensure that you have set aside enough time to complete the Challenge Lab before you start.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cybersecurity Management