Esc
Exploitation of Remote Services - T1210
(ATT&CK® Technique)
Definition
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. A common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.