Adversaries may gain access to and use centralized software suites installed within an enterprise to execute commands and move laterally through the network.

Tactics
TA0002 TA0008


See: MITRE ATT&CK