SSH Hijacking
Adversaries may hijack a legitimate user's SSH session to move laterally within an environment. Secure Shell (SSH) is a standard means of remote access on Linux and macOS systems. It allows a user to connect to another system via an encrypted tunnel, commonly authenticating through a password, certificate or the use of an asymmetric encryption key pair. In order to move laterally from a compromised host, adversaries may take advantage of trust relationships established with other systems via pu...
BY SOURCE
PROCEDURES (7)
Auto-extracted: 2 detections for persist
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for network connection monitoring
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for child process
Auto-extracted: 1 detections for credential