- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects attempts to create a sticky key backdoor by replacing the legitimate sethc.exe with cmd.exe, enabling command prompt access from the login screen.
This rule monitors Windows command line activity for operations that replace the Windows Sticky Keys executable (sethc.exe) with the command prompt (cmd.exe). This technique, often referred to as a “sticky key backdoor”, allows attackers to gain SYSTEM-level command prompt access directly from the Windows login screen without authentication by pressing the Shift key five times. The sticky key accessibility feature is designed to help users with physical disabilities, but when compromised, it becomes a powerful persistence mechanism that allows attackers to regain privileged access even after credentials are changed. This method is particularly dangerous because it operates at the login screen, before authentication, and with the highest system privileges.
{{host}}
system by checking its digital signature and comparing its hash with a known good version.