This site has been deprecated in favor of https://attack.mitre.org and will remain in place until 11/1/22.
Browse data: Technique
Jump to navigation
Jump to search
- Choose a category:
- Defense Evasion (0)
- Group (9)
- Levels (0)
- Mitigation (51)
- Software (19)
- System (2)
- Technique (78)
- Wyvern Escalation (0)
Technique
Click on one or more items below to narrow your results.
Data Source:
Showing below up to 78 results in range #1 to #78.
View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)
A
- Activate Firmware Update Mode (Activate Firmware Update Mode)
- Alarm Suppression (Alarm Suppression)
- Automated Collection (Automated Collection)
B
- Block Command Message (Block Command Message)
- Block Reporting Message (Block Reporting Message)
- Block Serial COM (Block Serial COM)
- Brute Force I/O (Brute Force I/O)
C
- Change Operating Mode (Change Operating Mode)
- Command-Line Interface (Command-Line Interface)
- Commonly Used Port (Commonly Used Port)
- Connection Proxy (Connection Proxy)
D
- Damage to Property (Damage to Property)
- Data Destruction (Data Destruction)
- Data from Information Repositories (Data from Information Repositories)
- Default Credentials (Default Credentials)
- Denial of Control (Denial of Control)
- Denial of Service (Denial of Service)
- Denial of View (Denial of View)
- Detect Operating Mode (Detect Operating Mode)
- Device Restart/Shutdown (Device Restart/Shutdown)
- Drive-by Compromise (Drive-by Compromise)
E
- Execution through API (Execution through API)
- Exploit Public-Facing Application (Exploit Public-Facing Application)
- Exploitation for Evasion (Exploitation for Evasion)
- Exploitation for Privilege Escalation (Exploitation for Privilege Escalation)
- Exploitation of Remote Services (Exploitation of Remote Services)
E cont.
- External Remote Services (External Remote Services)
G
- Graphical User Interface (Graphical User Interface)
H
- Hooking (Hooking)
I
- I/O Image (I/O Image)
- Indicator Removal on Host (Indicator Removal on Host)
- Internet Accessible Device (Internet Accessible Device)
L
- Lateral Tool Transfer (Lateral Tool Transfer)
- Loss of Availability (Loss of Availability)
- Loss of Control (Loss of Control)
- Loss of Productivity and Revenue (Loss of Productivity and Revenue)
- Loss of Protection (Loss of Protection)
- Loss of Safety (Loss of Safety)
- Loss of View (Loss of View)
M
- Man in the Middle (Man in the Middle)
- Manipulate I/O Image (Manipulate I/O Image)
- Manipulation of Control (Manipulation of Control)
- Manipulation of View (Manipulation of View)
- Masquerading (Masquerading)
- Modify Alarm Settings (Modify Alarm Settings)
- Modify Controller Tasking (Modify Controller Tasking)
- Modify Parameter (Modify Parameter)
- Modify Program (Modify Program)
- Module Firmware (Module Firmware)
- Monitor Process State (Monitor Process State)
N
- Native API (Native API)
- Network Connection Enumeration (Network Connection Enumeration)
N cont.
- Network Sniffing (Network Sniffing)
P
- Point & Tag Identification (Point & Tag Identification)
- Program Download (Program Download)
- Program Upload (Program Upload)
- Project File Infection (Project File Infection)
R
- Remote Services (Remote Services)
- Remote System Discovery (Remote System Discovery)
- Remote System Information Discovery (Remote System Information Discovery)
- Replication Through Removable Media (Replication Through Removable Media)
- Rogue Master (Rogue Master)
- Rootkit (Rootkit)
S
- Screen Capture (Screen Capture)
- Scripting (Scripting)
- Service Stop (Service Stop)
- Spearphishing Attachment (Spearphishing Attachment)
- Spoof Reporting Message (Spoof Reporting Message)
- Standard Application Layer Protocol (Standard Application Layer Protocol)
- Supply Chain Compromise (Supply Chain Compromise)
- System Firmware (System Firmware)
T
- Theft of Operational Information (Theft of Operational Information)
- Transient Cyber Asset (Transient Cyber Asset)
U
- Unauthorized Command Message (Unauthorized Command Message)
- User Execution (User Execution)
V
- Valid Accounts (Valid Accounts)
W
- Wireless Compromise (Wireless Compromise)
- Wireless Sniffing (Wireless Sniffing)