MITRE ATT&CK

Framework di tattiche e tecniche degli avversari

691
Tecniche
14
Tattiche
0
Mitigazioni
4.362
Actor-Technique Links
MITRE ATT&CK 691
ID Tecniche Tattica Piattaforme Threat Actors Azioni
T1114.001 Local Email Collection Sub Collection Windows 6
T1114.002 Remote Email Collection Sub Collection Windows, Office Suit 12
T1114.003 Email Forwarding Rule Sub Collection Linux, macOS, Office... 5
T1115 Clipboard Data Collection Linux, macOS, Window 3
T1119 Automated Collection Collection IaaS, Linux, macOS... 20
T1120 Peripheral Device Discovery Discovery Linux, Windows, macO 9
T1123 Audio Capture Collection Linux, macOS, Window 1
T1124 System Time Discovery Discovery ESXi, Linux, macOS... 13
T1125 Video Capture Collection Windows, macOS, Linu 3
T1127 Trusted Developer Utilities Proxy Execution Defense Evasion Windows 0
T1127.001 MSBuild Sub Defense Evasion Windows 0
T1127.002 ClickOnce Sub Defense Evasion Windows 0
T1127.003 JamPlus Sub Defense Evasion Windows 0
T1129 Shared Modules Execution Linux, macOS, Window 1
T1132 Data Encoding Command and Control Linux, macOS, Window... 1
T1132.001 Standard Encoding Sub Command and Control ESXi, Linux, Windows... 11
T1132.002 Non-Standard Encoding Sub Command and Control ESXi, Linux, macOS... 0
T1133 External Remote Services Persistence, Initial Acce... Containers, Linux, m... 26
T1134 Access Token Manipulation Privilege Escalation, Def... Windows 3
T1134.001 Token Impersonation/Theft Sub Privilege Escalation, Def... Windows 2
T1134.002 Create Process with Token Sub Privilege Escalation, Def... Windows 2
T1134.003 Make and Impersonate Token Sub Privilege Escalation, Def... Windows 2
T1134.004 Parent PID Spoofing Sub Privilege Escalation, Def... Windows 0
T1134.005 SID-History Injection Sub Privilege Escalation, Def... Windows 0
T1135 Network Share Discovery Discovery Linux, macOS, Window 16