During this talk, we will discuss the various stages of lateral movement from credential theft techniques, privilege escalation and finding network targets to code execution methods, we will retrospect on some infamous lateral movement methods. We will also discuss how to detect and mislead an attacker’s lateral movement using network deception and approaches that can be taken to build the deceptive network.
Chintan Shah Chintan Shah is currently working as a Lead Security Researcher with McAfee Intrusion Prevention System team and holds broad experience in the network security industry. He primarily focuses on Exploit and vulnerability research, building Threat Intelligence frameworks, Reverse engineering techniques, advanced threats and malware analysis. Chintan had researched and uncovered multiple targeted and espionage attacks in the past and worked with multiple enforcement agencies and blogging about them. He holds multiple patents in the exploit detection and prevention techniques . His interests lies in software fuzzing for vulnerability discovery, reversing engineering and analyzing exploits, malwares and translating the research into product improvement.