Watch this video on YouTube
Fill in the blank: Advanced hackers often use __________ to move laterally within a network after gaining initial access.