Skip to main content
T1021Lateral Movementmedium difficulty

Remote Services

Remote Services (T1021) is a MITRE ATT&CK technique in the Lateral Movement tactic. SOC analysts detect it by monitoring for SIEM, Firewall events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

SIEMFirewall

What is Remote Services?

Adversaries may use valid accounts to log into a service specifically designed to accept remote connections, such as telnet, SSH, and VNC. The adversary may then perform actions as the logged-on user. Remote services are commonly used for lateral movement in enterprise environments because they are difficult to distinguish from legitimate administrative activity when using valid credentials. Common lateral movement techniques include using stolen credentials with Remote Desktop Protocol (RDP), SSH, Windows Remote Management (WinRM), Distributed Component Object Model (DCOM), and SMB/Windows Admin Shares. After compromising an initial host and acquiring credentials through credential dumping or other means, attackers systematically move through the network using these services to access additional systems, escalate privileges, and ultimately reach their target data or assets.

Remote Services is documented as technique T1021 in the MITRE ATT&CK knowledge base under the Lateral Movement tactic. Detection requires visibility into SIEM, Firewall telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify Remote Services activity. These methods apply across SIEM, Firewall environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor RDP authentication events for logons from unusual source hosts, particularly from workstations connecting to servers or from hosts that have not previously used RDP to access specific destinations.

  2. 2

    Alert on WinRM and PowerShell remoting sessions initiated outside of normal administrative workflows, particularly those executing unusual command sequences or spawning additional processes on remote systems.

  3. 3

    Detect SMB lateral movement by monitoring for authentication to Admin shares (C$, IPC$, ADMIN$) combined with subsequent file creation or process execution on the target systems.

  4. 4

    Implement UEBA rules that baseline normal remote service usage patterns per user and alert on deviations including new destination systems, unusual connection times, and unusually high numbers of remote sessions.

  5. 5

    Monitor for pass-the-hash and pass-the-ticket artifacts in authentication logs, including NTLM authentication events for accounts where only Kerberos is expected or vice versa.

Example Alerts

These realistic alert examples show what Remote Services looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

CriticalSIEM

RDP Lateral Movement Chain Detected

Authentication correlation detected systematic RDP lateral movement: account DA_svc_backup used RDP to connect sequentially to 8 systems over 35 minutes. Pattern started from initial compromised host, moved to file servers, then domain controller. Each hop occurred within 3-5 minutes of arrival on the previous system, consistent with automated lateral movement tooling.

HighSIEM

WinRM Remote Command Execution

WinRM session established from HR workstation WS-HR-007 to multiple servers using domain admin account credentials. Remote execution via Invoke-Command spawned PowerShell processes on 6 target servers, each executing the same credential harvesting script. The workstation operator is an HR employee with no legitimate need to remotely execute commands on server infrastructure.

CriticalSIEM

Pass-the-Hash via SMB Admin Share

NTLM authentication to C$ admin share on 12 servers from a single source workstation within 8 minutes using account local_admin. The authentication method is NTLM-v2 without an interactive logon preceding it, and no Kerberos ticket exchange occurred. This pattern indicates Pass-the-Hash lateral movement using a captured NTLM hash rather than a cleartext password.

Practice Detecting Remote Services

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Remote Services. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect Remote Services?
SOC analysts detect Remote Services (T1021) by monitoring SIEM, Firewall telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor rdp authentication events for logons from unusual source hosts, particularly from workstations connecting to servers or from hosts that have n. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Remote Services?
Remote Services can be detected using SIEM, Firewall platforms. SIEM tools are particularly effective for this technique because they provide visibility into the lateral movement phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Remote Services in real-world attacks?
Remote Services is a well-documented MITRE ATT&CK technique in the Lateral Movement tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Remote Services scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Remote Services for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Lateral Movement techniques like Remote Services. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is Lateral Movement? — SOC Glossary

Lateral movement is the attack phase where adversaries expand access from an initial foothold to additional systems, usi…

Read more
Glossary

What is XDR? — SOC Glossary

Extended Detection and Response (XDR) is a security platform that unifies telemetry from endpoints, networks, cloud work…

Read more
Glossary

What is NDR? — SOC Glossary

Network Detection and Response (NDR) is a security platform that passively monitors network traffic using machine learni…

Read more
Glossary

What is EDR? — SOC Glossary

Endpoint Detection and Response (EDR) is a security technology that continuously monitors endpoint activity, recording p…

Read more
Career Path

Incident Responder Career Guide — Salary & Skills

Incident Responders lead the technical response when confirmed breaches happen. You coordinate containment, run forensic…

Read more
Career Path

DFIR Analyst Career Guide — Salary & Skills

DFIR Analysts combine forensic investigation with incident response. You collect and analyze digital evidence from compr…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Tool

Firewall Training Console — SOCSimulator

The Firewall console in SOCSimulator replicates the log analysis experience of enterprise platforms like Palo Alto Netwo…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Playbook

Lateral Movement Investigation — Investigation Playbook

When alerts indicate unusual internal connections, RDP to servers from workstations, PsExec executions, or SMB access to…

Read more
Glossary

SOC Glossary — Security Operations Terminology

Complete glossary of Security Operations Center terminology for aspiring SOC analysts.

Read more

We use cookies to improve your experience and measure usage. Learn more