The Cyber Threat Perspective cover image

Episode 17: Abusing WSUS for Lateral Movement

The Cyber Threat Perspective

00:00

Challenges in Compromising WSUS for Lateral Movement

This chapter examines the obstacles attackers encounter when trying to exploit a WSUS server for lateral movement in a network. It also discusses the methods used to gain access, the significance of Microsoft-signed binaries for malicious updates, and how nested group permissions can aid in unauthorized access.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app