Critical Infrastructure Cybersecurity Framework
T1202Defense Evasion1 Mitigations

Indirect Command Execution

Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

Description

Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Disable or Remove Feature or Program

Quick Info

Technique ID
T1202
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.