
Episode 17: Abusing WSUS for Lateral Movement
The Cyber Threat Perspective
00:00
Challenges in Compromising WSUS for Lateral Movement
This chapter examines the obstacles attackers encounter when trying to exploit a WSUS server for lateral movement in a network. It also discusses the methods used to gain access, the significance of Microsoft-signed binaries for malicious updates, and how nested group permissions can aid in unauthorized access.
Transcript
Play full episode