Remote Access Tools
An adversary may use legitimate remote access tools to establish an interactive command and control channel within a network. Remote access tools create a session between two trusted hosts through a graphical interface, a command line interaction, a protocol tunnel via development or management software, or hardware-level access such as KVM (Keyboard, Video, Mouse) over IP solutions. Desktop support software (usually graphical interface) and remote management software (typically command line int...
BY SOURCE
PROCEDURES (24)
Auto-extracted: 3 detections for exfiltrat
Auto-extracted: 3 detections for network connection monitoring
Auto-extracted: 2 detections for tunnel
Auto-extracted: 2 detections for dns
Auto-extracted: 2 detections for general monitoring
Auto-extracted: 2 detections for service monitoring
Auto-extracted: 2 detections for download
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for registry
Auto-extracted: 1 detections for tunnel
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for module load monitoring
Auto-extracted: 1 detections for tunnel
Auto-extracted: 1 detections for registry
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for c2