# lateral-movement
8 articlestagged with “lateral-movement”
MCP Multi-Server Lateral Movement
Techniques for pivoting between connected MCP servers to achieve lateral movement in complex agent architectures.
Trust Boundary Attacks
Methodology for exploiting trust relationships between agents in multi-agent systems, including rogue agent registration, capability spoofing, transitive trust chain exploitation, and lateral movement techniques.
Skill Verification: AI System Lateral Movement
Skill verification for moving from compromised AI components to connected systems and data stores.
Cross-Cloud Attack Scenarios
Red team attack scenarios spanning multiple cloud providers: credential pivoting between AWS, Azure, and GCP, data exfiltration across cloud boundaries, and model portability risks.
Attacks on AI Workload Schedulers
Exploiting Slurm, Kubernetes, and custom schedulers to hijack GPU resources, poison training jobs, and achieve lateral movement in AI clusters
Lab: Tool Chain Lateral Movement
Chain tool call exploits to achieve lateral movement across services connected to LLM agent systems.
Lateral Movement in AI Systems
Techniques for moving laterally through AI system architectures after initial compromise, including agent-to-agent pivoting and tool exploitation.
Pivoting from AI to Traditional Infrastructure
Techniques for pivoting from AI system compromise to traditional infrastructure access.