DETECTION OVERVIEW
Risk Factors
It is relatively easy to download Linux distributions, such as Kali Linux, that are packaged with tools an attacker could leverage for malicious purposes, such as identifying network vulnerabilities or gaining unauthorized access to devices. However, these tools are often complex and difficult to work with, which lowers the likelihood of an attack.
Kill Chain
Risk Score
56
N/A
Filter or block outbound requests to known hacking domains
Quarantine the device, determine that it belongs on your network, and check for malicious activity