Remote services could be used to support remote access, data transmission, authentication, name resolution, and other remote functions. Remote services may be necessary to allow operators and administrators to configure systems within the network from their engineering or management workstations. An adversary may use this technique to access devices which may be dual-homed1 to multiple network segments, and can be used for Program Download or to execute attacks on control devices directly through Valid Accounts. All remote services should require strong authentication before providing user access.”]
Source: https://collaborate.mitre.org/attackics/index.php/Technique/T0886

