Esc
Remote Service Session Hijacking - T1563
(ATT&CK® Technique)
Definition
Adversaries may take control of preexisting sessions with remote services to move laterally in an environment. Users may use valid credentials to log into a service specifically designed to accept remote connections, such as telnet, SSH, and RDP. When a user logs into a service, a session will be established that will allow them to maintain a continuous interaction with that service.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.
graph LR; T1563["Remote Service Session Hijacking"] --> |produces| AdministrativeNetworkTraffic["Administrative Network Traffic"]; class T1563 OffensiveTechniqueNode; class AdministrativeNetworkTraffic ArtifactNode; click AdministrativeNetworkTraffic href "/dao/artifact/d3f:AdministrativeNetworkTraffic"; click T1563 href "/offensive-technique/attack/T1563/"; click AdministrativeNetworkTraffic href "/dao/artifact/d3f:AdministrativeNetworkTraffic"; T1563["Remote Service Session Hijacking"] --> |accesses| RemoteSession["Remote Session"]; class T1563 OffensiveTechniqueNode; class RemoteSession ArtifactNode; click RemoteSession href "/dao/artifact/d3f:RemoteSession"; click T1563 href "/offensive-technique/attack/T1563/"; click RemoteSession href "/dao/artifact/d3f:RemoteSession"; T1563["Remote Service Session Hijacking"] --> |accesses| RDPSession["RDP Session"]; class T1563 OffensiveTechniqueNode; class RDPSession ArtifactNode; click RDPSession href "/dao/artifact/d3f:RDPSession"; click T1563 href "/offensive-technique/attack/T1563/"; click RDPSession href "/dao/artifact/d3f:RDPSession"; T1563["Remote Service Session Hijacking"] --> |accesses| SSHSession["SSH Session"]; class T1563 OffensiveTechniqueNode; class SSHSession ArtifactNode; click SSHSession href "/dao/artifact/d3f:SSHSession"; click T1563 href "/offensive-technique/attack/T1563/"; click SSHSession href "/dao/artifact/d3f:SSHSession"; RemoteTerminalSessionDetection["Remote Terminal Session Detection"] --> | analyzes | AdministrativeNetworkTraffic["Administrative Network Traffic"]; RemoteTerminalSessionDetection["Remote Terminal Session Detection"] -.-> | may-detect | T1563["Remote Service Session Hijacking"] ; class RemoteTerminalSessionDetection DefensiveTechniqueNode; class AdministrativeNetworkTraffic ArtifactNode; click RemoteTerminalSessionDetection href "/technique/d3f:RemoteTerminalSessionDetection"; NetworkTrafficCommunityDeviation["Network Traffic Community Deviation"] --> | analyzes | AdministrativeNetworkTraffic["Administrative Network Traffic"]; NetworkTrafficCommunityDeviation["Network Traffic Community Deviation"] -.-> | may-detect | T1563["Remote Service Session Hijacking"] ; class NetworkTrafficCommunityDeviation DefensiveTechniqueNode; class AdministrativeNetworkTraffic ArtifactNode; click NetworkTrafficCommunityDeviation href "/technique/d3f:NetworkTrafficCommunityDeviation"; NetworkTrafficSignatureAnalysis["Network Traffic Signature Analysis"] --> | analyzes | AdministrativeNetworkTraffic["Administrative Network Traffic"]; NetworkTrafficSignatureAnalysis["Network Traffic Signature Analysis"] -.-> | may-detect | T1563["Remote Service Session Hijacking"] ; class NetworkTrafficSignatureAnalysis DefensiveTechniqueNode; class AdministrativeNetworkTraffic ArtifactNode; click NetworkTrafficSignatureAnalysis href "/technique/d3f:NetworkTrafficSignatureAnalysis"; ProtocolMetadataAnomalyDetection["Protocol Metadata Anomaly Detection"] --> | analyzes | AdministrativeNetworkTraffic["Administrative Network Traffic"]; ProtocolMetadataAnomalyDetection["Protocol Metadata Anomaly Detection"] -.-> | may-detect | T1563["Remote Service Session Hijacking"] ; class ProtocolMetadataAnomalyDetection DefensiveTechniqueNode; class AdministrativeNetworkTraffic ArtifactNode; click ProtocolMetadataAnomalyDetection href "/technique/d3f:ProtocolMetadataAnomalyDetection"; Client-serverPayloadProfiling["Client-server Payload Profiling"] --> | analyzes | AdministrativeNetworkTraffic["Administrative Network Traffic"]; Client-serverPayloadProfiling["Client-server Payload Profiling"] -.-> | may-detect | T1563["Remote Service Session Hijacking"] ; class Client-serverPayloadProfiling DefensiveTechniqueNode; class AdministrativeNetworkTraffic ArtifactNode; click Client-serverPayloadProfiling href "/technique/d3f:Client-serverPayloadProfiling"; PerHostDownload-UploadRatioAnalysis["Per Host Download-Upload Ratio Analysis"] --> | analyzes | AdministrativeNetworkTraffic["Administrative Network Traffic"]; PerHostDownload-UploadRatioAnalysis["Per Host Download-Upload Ratio Analysis"] -.-> | may-detect | T1563["Remote Service Session Hijacking"] ; class PerHostDownload-UploadRatioAnalysis DefensiveTechniqueNode; class AdministrativeNetworkTraffic ArtifactNode; click PerHostDownload-UploadRatioAnalysis href "/technique/d3f:PerHostDownload-UploadRatioAnalysis"; SessionTermination["Session Termination"] --> | deletes | SSHSession["SSH Session"]; SessionTermination["Session Termination"] -.-> | may-evict | T1563["Remote Service Session Hijacking"] ; class SessionTermination DefensiveTechniqueNode; class SSHSession ArtifactNode; click SessionTermination href "/technique/d3f:SessionTermination"; SessionTermination["Session Termination"] --> | deletes | RemoteSession["Remote Session"]; class SessionTermination DefensiveTechniqueNode; class RemoteSession ArtifactNode; click SessionTermination href "/technique/d3f:SessionTermination"; SessionTermination["Session Termination"] --> | deletes | RDPSession["RDP Session"]; class SessionTermination DefensiveTechniqueNode; class RDPSession ArtifactNode; click SessionTermination href "/technique/d3f:SessionTermination"; NetworkTrafficFiltering["Network Traffic Filtering"] --> | filters | AdministrativeNetworkTraffic["Administrative Network Traffic"]; NetworkTrafficFiltering["Network Traffic Filtering"] -.-> | may-isolate | T1563["Remote Service Session Hijacking"] ; class NetworkTrafficFiltering DefensiveTechniqueNode; class AdministrativeNetworkTraffic ArtifactNode; click NetworkTrafficFiltering href "/technique/d3f:NetworkTrafficFiltering"; UserGeolocationLogonPatternAnalysis["User Geolocation Logon Pattern Analysis"] --> | analyzes | AdministrativeNetworkTraffic["Administrative Network Traffic"]; UserGeolocationLogonPatternAnalysis["User Geolocation Logon Pattern Analysis"] -.-> | may-detect | T1563["Remote Service Session Hijacking"] ; class UserGeolocationLogonPatternAnalysis DefensiveTechniqueNode; class AdministrativeNetworkTraffic ArtifactNode; click UserGeolocationLogonPatternAnalysis href "/technique/d3f:UserGeolocationLogonPatternAnalysis";