Adversaries may use Valid Accounts to log into a service specifically designed to accept remote connections, such as telnet, SSH, and VNC. The adversary may then perform actions as the logged-on user.
In an enterprise environment, servers and workstations can be organized into domains. Domains provide centralized identity management, allowing users to login using one set of credentials across the entire network. If an adversary is able to obtain a set of valid domain credentials, they could login to many different machines using remote access protocols such as secure shell (SSH) or remote desktop protocol (RDP).(Citation: SSH Secure Shell)(Citation: TechNet Remote Desktop Services)
View in MITRE ATT&CK®Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1021.003 | Distributed Component Object Model | 22 |
T1021.001 | Remote Desktop Protocol | 28 |
T1021.002 | SMB/Windows Admin Shares | 20 |
T1021.004 | SSH | 20 |
T1021.005 | VNC | 27 |
T1021.006 | Windows Remote Management | 20 |