DISTRIBUTING THE ATTACK CHAIN THROUGH DETECTING CREDENTIAL DUMPING
An attack chain comes with it a number of steps and sequential processes. Credential dumping being crucial, it is vital for troubleshooting its presence early enough. Once an attack to a system is launched, the attacker sets foot into the system and laterally moves within identifying their target. During this lateral movement is when the attacker gets passwords and logins of the administrator account first, a process known as privilege escalation. Once these privileges are acquired, the attacker is therefore at a position to access even the most sensitive information in the system using credential dumping methods. Privilege escalation is always performed before any credential dumping attempts. Detecting, monitoring, and blocking of any attacker's lateral movement is vital thereof. To do this, powerful technology is necessary. Across all control points. Norton security offers detailed defense under the auspices of its portfolio as a defense ...