• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Hacking Tool Domain Access

Risk Factors

It is relatively easy to download Linux distributions, such as Kali Linux, that are packaged with tools an attacker could leverage for malicious purposes, such as identifying network vulnerabilities or gaining unauthorized access to devices. However, these tools are often complex and difficult to work with, which lowers the likelihood of an attack.

Kill Chain

Caution

Risk Score

56

Detection diagram
Next in Caution: Inbound Connection from a Cobalt Strike IP Address

Attack Background

N/A

Mitigation Options

Filter or block outbound requests to known hacking domains

Quarantine the device, determine that it belongs on your network, and check for malicious activity

What else can RevealX do for you?