Curriculum
Course: Cyber Security
Login

Curriculum

Cyber Security

Text lesson

Peer to peer traffic

Most networks operate on a client-server model, where clients access information from servers and interact through them. However, attackers may exploit peer-to-peer (client-to-client) communication to take advantage of weak credentials or vulnerable clients. For instance, port 445, used by SMB, can indicate compromise; typically, clients shouldn’t communicate via SMB, but during an attack, it may be used to further compromise systems.

peer to peer

Lateral Movement and Pivoting

Once a system is compromised, an attacker can use it to explore additional networks that the compromised system can access, often due to elevated privileges or additional network interfaces. This technique, known as pivoting, allows the attacker to leverage the compromised host to reach and scan other networks.

pivoting

Lateral movement involves using a compromised system as a pivot to exploit another system, allowing the attacker to further explore and compromise additional targets. In this scenario, Eve uses Server X to discover System B.

pivoting 1