Esc
Remote Access Hardware - T1219.003
(ATT&CK® Technique)
Definition
An adversary may use legitimate remote access hardware to establish an interactive command and control channel to target systems within networks. These services, including IP-based keyboard, video, or mouse (KVM) devices such as TinyPilot and PiKVM, are commonly used as legitimate tools and may be allowed by peripheral device policies within a target environment.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.