DETECTION OVERVIEW
Risk Factors
Administration tools can help an attacker run malicious commands on remote devices, enabling the attacker to laterally move across the network while evading detection. An attacker with administrator credentials can take advantage of PowerShell remoting to compromise devices on a network. The amount of damage done to a network depends on which devices are compromised.
The system might change the risk score for this detection.
Kill Chain

$source sent a Web Services-Management (WSMan) request specifying administrative actions to the victim for the first time. Confirm whether $source should be remotely administering or modifying the victim. Attackers can take advantage of this technique with PowerShell remoting to laterally move across the network.
The Windows operating system includes PowerShell, an administrative tool for automating the management of computer systems. PowerShell provides access to the Microsoft implementation of Web Services-Management (WSMan) protocol, which is a standard that is based on the XML-based message protocol, SOAP. WSMan remoting modules in PowerShell enable users to run PowerShell commands on remote devices. For example, when an administrator wants to manage a remote server, they run a PowerShell command on their client. The PowerShell client sends a WSMan request to the remote server.
The WSMan request includes a pair of XML schemas that specify an administrative action on a remote device, such as running a shell command, creating a Windows process to run a command, or sending command input. If an attacker steals administrator credentials, they can send WSMan requests with administrative actions through PowerShell remoting to compromise devices across a network.
Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.
ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response
Visit this resource for more information.
This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.
Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.
Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.
