MITRE ATT&CK
Framework di tattiche e tecniche degli avversari
691
Tecniche
14
Tattiche
0
Mitigazioni
4.362
Actor-Technique Links
MITRE ATT&CK 691
| ID | Tecniche | Tattica | Piattaforme | Threat Actors | Azioni |
|---|---|---|---|---|---|
| T1572 | Protocol Tunneling | Command and Control | ESXi, Linux, macOS... | 14 | |
| T1573 | Encrypted Channel | Command and Control | ESXi, Linux, macOS... | 4 | |
| T1573.001 | Symmetric Cryptography Sub | Command and Control | ESXi, Linux, macOS... | 14 | |
| T1573.002 | Asymmetric Cryptography Sub | Command and Control | ESXi, Linux, macOS... | 11 | |
| T1574 | Hijack Execution Flow | Persistence, Privilege Es... | Linux, macOS, Window | 0 | |
| T1574.001 | DLL Sub | Persistence, Privilege Es... | Windows | 32 | |
| T1574.004 | Dylib Hijacking Sub | Persistence, Privilege Es... | macOS | 0 | |
| T1574.005 | Executable Installer File Permissions Weakness Sub | Persistence, Privilege Es... | Windows | 1 | |
| T1574.006 | Dynamic Linker Hijacking Sub | Persistence, Privilege Es... | Linux, macOS | 3 | |
| T1574.007 | Path Interception by PATH Environment Variable Sub | Persistence, Privilege Es... | Windows, macOS, Linu | 0 | |
| T1574.008 | Path Interception by Search Order Hijacking Sub | Persistence, Privilege Es... | Windows | 0 | |
| T1574.009 | Path Interception by Unquoted Path Sub | Persistence, Privilege Es... | Windows | 0 | |
| T1574.010 | Services File Permissions Weakness Sub | Persistence, Privilege Es... | Windows | 0 | |
| T1574.011 | Services Registry Permissions Weakness Sub | Persistence, Privilege Es... | Windows | 0 | |
| T1574.012 | COR_PROFILER Sub | Persistence, Privilege Es... | Windows | 1 | |
| T1574.013 | KernelCallbackTable Sub | Persistence, Privilege Es... | Windows | 1 | |
| T1574.014 | AppDomainManager Sub | Persistence, Privilege Es... | Windows | 0 | |
| T1578 | Modify Cloud Compute Infrastructure | Defense Evasion | IaaS | 0 | |
| T1578.001 | Create Snapshot Sub | Defense Evasion | IaaS | 0 | |
| T1578.002 | Create Cloud Instance Sub | Defense Evasion | IaaS | 2 | |
| T1578.003 | Delete Cloud Instance Sub | Defense Evasion | IaaS | 2 | |
| T1578.004 | Revert Cloud Instance Sub | Defense Evasion | IaaS | 0 | |
| T1578.005 | Modify Cloud Compute Configurations Sub | Defense Evasion | IaaS | 0 | |
| T1580 | Cloud Infrastructure Discovery | Discovery | IaaS | 2 | |
| T1583 | Acquire Infrastructure | Resource Development | PRE | 8 |