Technique Matrix

From attackics
Jump to navigation Jump to search
Initial Access Drive-by CompromiseExploit Public-Facing ApplicationExploitation of Remote ServicesExternal Remote ServicesInternet Accessible DeviceRemote ServicesReplication Through Removable MediaRogue MasterSpearphishing AttachmentSupply Chain CompromiseTransient Cyber AssetWireless Compromise
Execution Change Operating ModeCommand-Line InterfaceExecution through APIGraphical User InterfaceHookingModify Controller TaskingNative APIScriptingUser Execution
Persistence Modify ProgramModule FirmwareProject File InfectionSystem FirmwareValid Accounts
Privilege Escalation Exploitation for Privilege EscalationHooking
Evasion Change Operating ModeExploitation for EvasionIndicator Removal on HostMasqueradingRootkitSpoof Reporting Message
Discovery Network Connection EnumerationNetwork SniffingRemote System DiscoveryRemote System Information DiscoveryWireless Sniffing
Lateral Movement Default CredentialsExploitation of Remote ServicesLateral Tool TransferProgram DownloadRemote ServicesValid Accounts
Collection Automated CollectionData from Information RepositoriesDetect Operating ModeI/O ImageMan in the MiddleMonitor Process StatePoint & Tag IdentificationProgram UploadScreen CaptureWireless Sniffing
Command and Control Commonly Used PortConnection ProxyStandard Application Layer Protocol
Inhibit Response Function Activate Firmware Update ModeAlarm SuppressionBlock Command MessageBlock Reporting MessageBlock Serial COMData DestructionDenial of ServiceDevice Restart/ShutdownManipulate I/O ImageModify Alarm SettingsRootkitService StopSystem Firmware
Impair Process Control Brute Force I/OModify ParameterModule FirmwareSpoof Reporting MessageUnauthorized Command Message
Impact Damage to PropertyDenial of ControlDenial of ViewLoss of AvailabilityLoss of ControlLoss of Productivity and RevenueLoss of ProtectionLoss of SafetyLoss of ViewManipulation of ControlManipulation of ViewTheft of Operational Information