In-Depth Look: APT Attack Tools of the Trade | Security Intelligence Blog

This is a very informative post about some of the most common tools used by both the attackers and red teams to perform network recon, move laterally, get and extract data, etc.

While many would think these tools are used during the initial compromise phase of an attack- that is not the case with this post. I will be focusing on the tools that are used after the initial compromise is attained. The following diagram illustrates where these tools are commonly used in a traditional APT lifecycle.