Problem Statement
Which describes lateral movement?
Explanation
After a foothold, attackers pivot to new systems to reach targets. Ethical tests simulate this step with permissions and approvals in place.
Code Solution
SolutionRead Only
Map paths: host A → share on host B → service token → host C
