Skip to content

Lateral Admin Movement

What is Lateral Admin Movement?

The Lateral Admin Movement attack models how an attacker moves across machines and accounts in Active Directory using lateral access techniques, eventually reaching a high-privilege target.

It focuses on chaining multiple lateral relations to simulate realistic post-compromise movement.


Definition (Project Scope)

A Lateral Admin Movement path is defined as:

A path starting from a User or Computer, ending at a high-value target, containing at least: - 2 lateral movement relations - 1 Computer node in the path


Key Idea

Attackers rarely escalate privileges in a single step.

Instead, they: - Move laterally between machines
- Reuse sessions or privileges
- Pivot across the infrastructure

Key lateral relations include: - AdminTo - HasSession - CanRDP - CanPSRemote - ExecuteDCOM

These represent real techniques used to move between systems.


Lateral Movement Detection

A valid path must satisfy:

  • Start: User or Computer
  • End: Target of interest (e.g., Administrators)
  • Contains at least 2 lateral relations
  • Includes at least one Computer node

Execution Block

cases = attacks.run_lateral_admin_movement(
    jsonl_path=graph,  
    max_cutoff=7,
    export_files=True,
    top_k_print=5,
    top_k_export=20
)

This block allows you to:

  • Detect lateral movement attack chains
  • Limit path length (max_cutoff)
  • Export results (export_files)
  • Display top cases (top_k_print)
  • Export a larger dataset (top_k_export)

Output

The function returns:

  • Multiple lateral movement paths
  • Chains combining sessions, admin rights, and remote access
  • Structured paths leading to privileged targets

Example of output

Visualisation Lateral Movment

Légende Lateral Movment

Technical Reference

For more details on the implementation, you can click on this link:

** attacks creation python module **

Summary

  • Lateral Admin Movement = multi-step lateral traversal
  • Uses sessions, remote access, and admin rights
  • Requires multiple lateral relations
  • Includes computer pivots
  • Leads to high-privilege targets