- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects lateral movement activity using Impacket’s PsExec implementation through network share access patterns.
This rule monitors Windows network share access events where @evt.id
is 5145
for access to the IPC$
administrative share when @Event.EventData.Data.RelativeTargetName
contains RemCom-related file patterns including RemCom_stdin
, RemCom_stdout
, or RemCom_stderr
. Impacket’s PsExec tool uses these specific named pipe files to establish command execution on remote systems. Unlike Microsoft’s official PsExec tool, Impacket PsExec creates distinctive file artifacts that can be reliably detected, making this an effective indicator of lateral movement activity commonly used by attackers.
{{host}}
.