This site has been deprecated in favor of https://attack.mitre.org and will remain in place until 11/1/22.
Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Privileged Account Management + ([[Mitigation/M0926]])
- Password Policies + ([[Mitigation/M0927]])
- Operating System Configuration + ([[Mitigation/M0928]])
- Network Segmentation + ([[Mitigation/M0930]])
- Network Intrusion Prevention + ([[Mitigation/M0931]])
- Multi-factor Authentication + ([[Mitigation/M0932]])
- Limit Hardware Installation + ([[Mitigation/M0934]])
- Limit Access to Resource Over Network + ([[Mitigation/M0935]])
- Account Use Policies + ([[Mitigation/M0936]])
- Filter Network Traffic + ([[Mitigation/M0937]])
- Execution Prevention + ([[Mitigation/M0938]])
- Encrypt Sensitive Information + ([[Mitigation/M0941]])
- Disable or Remove Feature or Program + ([[Mitigation/M0942]])
- Restrict Library Loading + ([[Mitigation/M0944]])
- Code Signing + ([[Mitigation/M0945]])
- Boot Integrity + ([[Mitigation/M0946]])
- Audit + ([[Mitigation/M0947]])
- Application Isolation and Sandboxing + ([[Mitigation/M0948]])
- Antivirus/Antimalware + ([[Mitigation/M0949]])
- Exploit Protection + ([[Mitigation/M0950]])
- Update Software + ([[Mitigation/M0951]])
- Data Backup + ([[Mitigation/M0953]])
- Software Configuration + ([[Mitigation/M0954]])
- Persistence + ([[Persistence]])
- Privilege Escalation + ([[Privilege Escalation]])
- Safety Instrumented System/Protection Relay + ([[Safety Instrumented System/Protection Relay]])
- Software: Industroyer, CRASHOVERRIDE + ([[Software/S0001|Industroyer]])
- Software: VPNFilter + ([[Software/S0002|VPNFilter]])
- Software: Backdoor.Oldrea, Havex + ([[Software/S0003|Backdoor.Oldrea]])
- Software: BlackEnergy 3 + ([[Software/S0004|BlackEnergy 3]])
- Software: Bad Rabbit, Diskcoder.D + ([[Software/S0005|Bad Rabbit]])
- Software: NotPetya + ([[Software/S0006|NotPetya]])
- Software: WannaCry + ([[Software/S0007|WannaCry]])
- Software: LockerGoga + ([[Software/S0008|LockerGoga]])
- Software: PLC-Blaster + ([[Software/S0009|PLC-Blaster]])
- Software: Stuxnet + ([[Software/S0010|Stuxnet]])
- Software: Ryuk + ([[Software/S0011|Ryuk]])
- Software: Conficker, Downadup, Kido + ([[Software/S0012|Conficker]])
- Software: Triton, TRISIS, HatMan + ([[Software/S0013|Triton]])
- Software: Duqu + ([[Software/S0014|Duqu]])
- Software: Flame, Flamer, sKyWIper + ([[Software/S0015|Flame]])
- Software: KillDisk + ([[Software/S0016|KillDisk]])
- Software: EKANS, SNAKEHOSE + ([[Software/S0017|EKANS]])
- Software: ACAD/Medre.A + ([[Software/S0018|ACAD/Medre.A]])
- Software: REvil, Sodinokibi, Sodin + ([[Software/S0019|REvil]])
- Activate Firmware Update Mode + ([[Technique/T0800|Activate Firmware Update Mode]])
- Monitor Process State + ([[Technique/T0801|Monitor Process State]])
- Automated Collection + ([[Technique/T0802|Automated Collection]])
- Block Command Message + ([[Technique/T0803|Block Command Message]])
- Block Reporting Message + ([[Technique/T0804|Block Reporting Message]])
- Block Serial COM + ([[Technique/T0805|Block Serial COM]])
- Brute Force I/O + ([[Technique/T0806|Brute Force I/O]])
- Command-Line Interface + ([[Technique/T0807|Command-Line Interface]])
- Data Destruction + ([[Technique/T0809|Data Destruction]])
- Data from Information Repositories + ([[Technique/T0811|Data from Information Repositories]])
- Default Credentials + ([[Technique/T0812|Default Credentials]])
- Denial of Control + ([[Technique/T0813|Denial of Control]])
- Denial of Service + ([[Technique/T0814|Denial of Service]])
- Denial of View + ([[Technique/T0815|Denial of View]])
- Device Restart/Shutdown + ([[Technique/T0816|Device Restart/Shutdown]])
- Drive-by Compromise + ([[Technique/T0817|Drive-by Compromise]])
- Exploit Public-Facing Application + ([[Technique/T0819|Exploit Public-Facing Application]])
- Exploitation for Evasion + ([[Technique/T0820|Exploitation for Evasion]])
- Modify Controller Tasking + ([[Technique/T0821|Modify Controller Tasking]])
- External Remote Services + ([[Technique/T0822|External Remote Services]])
- Graphical User Interface + ([[Technique/T0823|Graphical User Interface]])
- Loss of Availability + ([[Technique/T0826|Loss of Availability]])
- Loss of Control + ([[Technique/T0827|Loss of Control]])
- Loss of Productivity and Revenue + ([[Technique/T0828|Loss of Productivity and Revenue]])
- Loss of View + ([[Technique/T0829|Loss of View]])
- Man in the Middle + ([[Technique/T0830|Man in the Middle]])
- Manipulation of Control + ([[Technique/T0831|Manipulation of Control]])
- Manipulation of View + ([[Technique/T0832|Manipulation of View]])
- Native API + ([[Technique/T0834|Native API]])
- Manipulate I/O Image + ([[Technique/T0835|Manipulate I/O Image]])
- Modify Parameter + ([[Technique/T0836|Modify Parameter]])
- Loss of Protection + ([[Technique/T0837|Loss of Protection]])
- Modify Alarm Settings + ([[Technique/T0838|Modify Alarm Settings]])
- Module Firmware + ([[Technique/T0839|Module Firmware]])
- Network Connection Enumeration + ([[Technique/T0840|Network Connection Enumeration]])
- Network Sniffing + ([[Technique/T0842|Network Sniffing]])
- Program Download + ([[Technique/T0843|Program Download]])
- Program Upload + ([[Technique/T0845|Program Upload]])
- Remote System Discovery + ([[Technique/T0846|Remote System Discovery]])
- Replication Through Removable Media + ([[Technique/T0847|Replication Through Removable Media]])
- Rogue Master + ([[Technique/T0848|Rogue Master]])
- Masquerading + ([[Technique/T0849|Masquerading]])
- Rootkit + ([[Technique/T0851|Rootkit]])
- Screen Capture + ([[Technique/T0852|Screen Capture]])
- Scripting + ([[Technique/T0853|Scripting]])
- Unauthorized Command Message + ([[Technique/T0855|Unauthorized Command Message]])
- Spoof Reporting Message + ([[Technique/T0856|Spoof Reporting Message]])
- System Firmware + ([[Technique/T0857|System Firmware]])
- Change Operating Mode + ([[Technique/T0858|Change Operating Mode]])
- Valid Accounts + ([[Technique/T0859|Valid Accounts]])
- Wireless Compromise + ([[Technique/T0860|Wireless Compromise]])
- Point & Tag Identification + ([[Technique/T0861|Point & Tag Identification]])
- Supply Chain Compromise + ([[Technique/T0862|Supply Chain Compromise]])
- User Execution + ([[Technique/T0863|User Execution]])
- Transient Cyber Asset + ([[Technique/T0864|Transient Cyber Asset]])
- Spearphishing Attachment + ([[Technique/T0865|Spearphishing Attachment]])
- Exploitation of Remote Services + ([[Technique/T0866|Exploitation of Remote Services]])
- Lateral Tool Transfer + ([[Technique/T0867|Lateral Tool Transfer]])
- Detect Operating Mode + ([[Technique/T0868|Detect Operating Mode]])
- Standard Application Layer Protocol + ([[Technique/T0869|Standard Application Layer Protocol]])
- Execution through API + ([[Technique/T0871|Execution through API]])
- Indicator Removal on Host + ([[Technique/T0872|Indicator Removal on Host]])
- Project File Infection + ([[Technique/T0873|Project File Infection]])
- Hooking + ([[Technique/T0874|Hooking]])
- I/O Image + ([[Technique/T0877|I/O Image]])
- Alarm Suppression + ([[Technique/T0878|Alarm Suppression]])
- Damage to Property + ([[Technique/T0879|Damage to Property]])
- Loss of Safety + ([[Technique/T0880|Loss of Safety]])
- Service Stop + ([[Technique/T0881|Service Stop]])
- Theft of Operational Information + ([[Technique/T0882|Theft of Operational Information]])
- Internet Accessible Device + ([[Technique/T0883|Internet Accessible Device]])
- Connection Proxy + ([[Technique/T0884|Connection Proxy]])
- Commonly Used Port + ([[Technique/T0885|Commonly Used Port]])
- Remote Services + ([[Technique/T0886|Remote Services]])
- Wireless Sniffing + ([[Technique/T0887|Wireless Sniffing]])
- Remote System Information Discovery + ([[Technique/T0888|Remote System Information Discovery]])
- Modify Program + ([[Technique/T0889|Modify Program]])
- Exploitation for Privilege Escalation + ([[Technique/T0890|Exploitation for Privilege Escalation]])
- Uncategorized + ([[Uncategorized]])
- WyvernSystemOne + ([[WyvernSystemOne]])
- WyvernSystemTwo + ([[WyvernSystemTwo]])