![](https://www.pwndefend.com/wp-content/uploads/2023/02/crimefighter-730x350.jpg)
A threat actor is inside your perimeter… what routes…
Ok that subject is massive…so this is a bit more of a targeted thought process to consider.
Each network is unique and technology deployments vary. One time I was in a network that was almost entirely Apple MacBooks and a door control panel…. which was ‘fun’.
So this is a general list of some things to consider if you have tech deployed such as:
- Active Directory
- Printers
- SCCM
- MSSQL