- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects PowerShell processes initiating a reverse shell connection, which is a common technique used by attackers to gain remote access and execute commands on a compromised system.
This detection monitors Windows event logs for PowerShell executions that contain specific command patterns associated with reverse shells. It looks for the combination of .NET socket programming indicators typical in reverse shells, including Net.Sockets.TCPClient
(creating a TCP connection), GetStream()
(accessing the network stream), and Write()
(sending data over the connection).
PowerShell reverse shells are a common post-exploitation technique that establish outbound connections from a compromised host to an attacker-controlled server.
{{host}}
system where the suspicious PowerShell reverse shell was detected.