Skip to content

TCPConnections

Tony Phipps edited this page Nov 7, 2019 · 3 revisions

Hooking

Credential Access, Persistence, Privilege Escalation

Analyze process behavior to determine if a process is performing actions it usually does not, such as opening network connections, reading files, or other suspicious actions that could relate to post-compromise behavior.

SELECT OwningProcessPath, LocalPort, RemotePort
GROUP BY OwningProcessPath, LocalPort, RemotePort

Connections

  • Active Connections
  • Listening Ports
  • Unusual process names that are listening or have open connections