Exploitation of Remote Services
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Description
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Available Mitigations
This technique can be mitigated using 5 documented security measures.
Exploit ProtectionLimit Access to Resource Over NetworkNetwork SegmentationUpdate SoftwareVulnerability Scanning
Quick Info
- Technique ID
- T1210
- Tactic
- Lateral Move
- Mitigations
- 5
