cybersecurity
TRANSCRIPT
local server
core server
remote system remote site
local system
ADVERSARY
local server
core server
remote system remote site
local system
ADVERSARY
initialfoothold
local system
ADVERSARY
command command and and
controlcontrol
initialinitialfootholdfoothold
lateral exploitation towards additional sites
lateral exploitation towards key resources