Threat Hunting the Shadows: Detecting Adversary Lateral Movement With Elasticsearch
This research investigates the elusive tactic of lateral movement employed by adversaries within a compromised network.The focus is on identifying the mechanisms and techniques used for lateral movement, with a particular emphasis on credential access.The study leverages a custom-designed Gravy and Sauce Boats Security Information and Event Managem