# Lateral Movement

**Lateral movement** involves the actions that attempt to expand their access within a compromised environment, exploring deeper layers of a network, moving across systems and networks to discover sensitive assets, and establishing more persistent access.&#x20;

<figure><img src="https://1571945027-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtgxeteB8N7iEoJU7WZh6%2Fuploads%2FVPIQ9LorRI2sA1ZF0GXk%2Fimage.png?alt=media&#x26;token=2279728c-047d-4c52-8c97-268d70c23a89" alt="" width="375"><figcaption></figcaption></figure>

This uses tactics to navigate through interconnected systems and reach high-value targets like databases, file servers, or administrative accounts

Some components that involve these practices are:

* **Pivoting:** Also known as tunneling, uses the exploited host as a proxy and performs actions from outside the network to make sure that non-routable networks can be reached
* Other previous actions such as evasive testing, information Gathering, vulnerability assessment, privilege escalation, and post-exploitation
