Technique Matrix

From attackics
Jump to navigation Jump to search
Initial Access Data Historian CompromiseDrive-by CompromiseEngineering Workstation CompromiseExploit Public-Facing ApplicationExternal Remote ServicesInternet Accessible DeviceReplication Through Removable MediaSpearphishing AttachmentSupply Chain CompromiseWireless Compromise
Execution Change Program StateCommand-Line InterfaceExecution through APIGraphical User InterfaceMan in the MiddleProgram Organization UnitsProject File InfectionScriptingUser Execution
Persistence HookingModule FirmwareProgram DownloadProject File InfectionSystem FirmwareValid Accounts
Evasion Exploitation for EvasionIndicator Removal on HostMasqueradingRogue Master DeviceRootkitSpoof Reporting MessageUtilize/Change Operating Mode
Discovery Control Device IdentificationI/O Module DiscoveryNetwork Connection EnumerationNetwork Service ScanningNetwork SniffingRemote System DiscoverySerial Connection Enumeration
Lateral Movement Default CredentialsExploitation of Remote ServicesExternal Remote ServicesProgram Organization UnitsRemote File CopyValid Accounts
Collection Automated CollectionData from Information RepositoriesDetect Operating ModeDetect Program StateI/O ImageLocation IdentificationMonitor Process StatePoint & Tag IdentificationProgram UploadRole IdentificationScreen Capture
Command and Control Commonly Used PortConnection ProxyStandard Application Layer Protocol
Inhibit Response Function Activate Firmware Update ModeAlarm SuppressionBlock Command MessageBlock Reporting MessageBlock Serial COMData DestructionDenial of ServiceDevice Restart/ShutdownManipulate I/O ImageModify Alarm SettingsModify Control LogicProgram DownloadRootkitSystem FirmwareUtilize/Change Operating Mode
Impair Process Control Brute Force I/OChange Program StateMasqueradingModify Control LogicModify ParameterModule FirmwareProgram DownloadRogue Master DeviceService StopSpoof Reporting MessageUnauthorized Command Message
Impact Damage to PropertyDenial of ControlDenial of ViewLoss of AvailabilityLoss of ControlLoss of Productivity and RevenueLoss of SafetyLoss of ViewManipulation of ControlManipulation of ViewTheft of Operational Information