Exploitation of Remote Services
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. A common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system. An adversary may need to determine ...
BY SOURCE
PROCEDURES (20)
Auto-extracted: 2 detections for event log
Auto-extracted: 2 detections for network connection monitoring
Auto-extracted: 2 detections for exfiltrat
Auto-extracted: 2 detections for privilege
Auto-extracted: 2 detections for anomal
Auto-extracted: 2 detections for dns
Auto-extracted: 2 detections for service
Auto-extracted: 2 detections for unusual
Auto-extracted: 2 detections for persist
Auto-extracted: 2 detections for general monitoring
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for bypass
Auto-extracted: 1 detections for authentication monitoring
Auto-extracted: 1 detections for event log
Auto-extracted: 1 detections for http
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for dns
Auto-extracted: 1 detections for http
Auto-extracted: 1 detections for dns