Lateral Movement

Name Technique Tactic
Active Directory Kerberos Attacks Remote System Discovery Discovery
Insider Threat Password Spraying, Brute Force Credential Access
Living Off The Land Bypass User Account Control, Abuse Elevation Control Mechanism Privilege Escalation