Carbon Black Free Webinar: Extending the Kill Chain with Lateral Movement on 5 Windows Systems Using Multiple Intrusion Techniques

WALTHAM, Mass., Feb. 22, 2016 (GLOBE NEWSWIRE) -- Carbon Black®, the leader in Next-Generation Endpoint Security (NGES), is hosting the free webinar: "Extending the Kill Chain with Lateral Movement on 5 Windows Systems Using Multiple Intrusion Techniques," on Thursday, February 25 at 12:00 p.m. EST.

We often talk about how attackers only need to establish a beachhead on one host, allowing them to focus on the most vulnerable endpoints in an organization. From there, adversaries can build a lateral attack plan to jump from one system to another until they reach the information you don't want them getting their hands on.

But how do they "jump" from one system to another? This webinar will demystify a variety of lateral movement techniques, and show you how to find them in your environment.

We'll focus on some of the most prevalent techniques, including:

• RDP Sticky Keys
• Reverse Shells
• Pass the hash
• Process name hiding
• File replacement
• Persistence

We will use several different hacker tools, including purpose-built tools such as:

• Meterpreter tools such as msfvenom, msfconsole
• Credential theft tools such as fgdump and creddump

And "innocent" system utilities such as:

• Netcat
• Psexec
• 7zip
• schtasks

This free session will demonstrate why every system is a target and why any vulnerable systems is a risk to the entire infrastructure. Carbon Black's Threat Intelligence team helped design this event. So, as part of the training, you will also see how our security platform tracks every step during the simulated attack.

WHAT: Free Webinar – "Extending the Kill Chain with Lateral Movement on 5 Windows Systems Using Multiple Intrusion Techniques"
WHEN: Thursday, February 25 at 12:00 p.m. EST.
REGISTER: Click here to register

About Carbon Black

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSSPs and enterprises to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker's every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.

Carbon Black is a registered trademark of Carbon Black, Inc. All other company or product names may be the trademarks of their respective owners.


Contact Data