CAPEC-555: Remote Services with Stolen Credentials

Standard Stable 严重程度: Very High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

This pattern of attack involves an adversary that uses stolen credentials to leverage remote services such as RDP, telnet, SSH, and VNC to log into a system. Once access is gained, any number of malicious activities could be performed.

缓解措施

Disable RDP, telnet, SSH and enable firewall rules to block such traffic. Limit users and accounts that have remote interactive login access. Remove the Local Administrators group from the list of groups allowed to login through RDP. Limit remote user permissions. Use remote desktop gateways and multifactor authentication for remote logins.

示例实例

Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user interface on a remote system. Microsoft refers to its implementation of the Remote Desktop Protocol (RDP) as Remote Desktop Services (RDS). There are other implementations and third-party tools that provide graphical access Remote Services similar to RDS. Adversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials.

Windows Remote Management (WinRM) is the name of both a Windows service and a protocol that allows a user to interact with a remote system (e.g., run an executable, modify the Registry, modify services). It may be called with the winrm command or by any number of programs such as PowerShell.

分类映射

分类名称 条目ID 条目名称
ATTACK 1021 Remote Services
ATTACK 1114.002 Email Collection:Remote Email Collection
ATTACK 1133 External Remote Services
关键信息

CAPEC ID: CAPEC-555

抽象级别: Standard

状态: Stable

典型严重程度: Very High

相关攻击模式