<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Attack Path Techniques from Tenable</title>
        <link>https://www.tenable.com/attack-path-techniques/feed</link>
        <description>Get the latest Attack Path Techniques updates from Tenable</description>
        <lastBuildDate>Thu, 09 Apr 2026 15:14:26 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Tenable Attack Path Techniques</generator>
        <image>
            <title>Attack Path Techniques from Tenable</title>
            <url>https://www.tenable.com/themes/custom/tenable/img/favicons/apple-touch-icon.png</url>
            <link>https://www.tenable.com/attack-path-techniques/feed</link>
        </image>
        <copyright>Copyright 2026 Tenable, Inc. All rights reserved.</copyright>
        <atom:link href="https://www.tenable.com/attack-path-techniques/feed" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[Program Upload]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0845_ICS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0845_ICS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Program Upload
      <h3>Platform</h3>
      OT
      <h3>Family</h3>
      Collection
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0845_ICS">https://www.tenable.com/attack-path-techniques/T0845_ICS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Project File Infection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0873_ICS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0873_ICS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Project File Infection
      <h3>Platform</h3>
      OT
      <h3>Family</h3>
      Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0873_ICS">https://www.tenable.com/attack-path-techniques/T0873_ICS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[External Remote Services]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1133_Azure</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1133_Azure</guid>
            <description><![CDATA[
      <h3>Name</h3>
      External Remote Services
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Initial Access, Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1133_Azure">https://www.tenable.com/attack-path-techniques/T1133_Azure</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Command and Scripting Interpreter: Cloud API]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1059.009_Azure</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1059.009_Azure</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Command and Scripting Interpreter: Cloud API
      <h3>Platform</h3>
      Entra ID
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1059.009_Azure">https://www.tenable.com/attack-path-techniques/T1059.009_Azure</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Remote Services: Cloud Services]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1021.007_Azure</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1021.007_Azure</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Remote Services: Cloud Services
      <h3>Platform</h3>
      Azure
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1021.007_Azure">https://www.tenable.com/attack-path-techniques/T1021.007_Azure</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Active Scanning: Scanning IP Blocks]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1595.001_PRE</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1595.001_PRE</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Active Scanning: Scanning IP Blocks
      <h3>Platform</h3>
      PRE
      <h3>Family</h3>
      Reconnaissance
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1595.001_PRE">https://www.tenable.com/attack-path-techniques/T1595.001_PRE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Remote System Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0846_ICS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0846_ICS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Remote System Discovery
      <h3>Platform</h3>
      OT
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0846_ICS">https://www.tenable.com/attack-path-techniques/T0846_ICS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Valid Accounts: Cloud Accounts]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1078.004_Azure</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1078.004_Azure</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Valid Accounts: Cloud Accounts
      <h3>Platform</h3>
      Entra ID
      <h3>Family</h3>
      Defense Evasion, Persistence, Privilege Escalation, Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1078.004_Azure">https://www.tenable.com/attack-path-techniques/T1078.004_Azure</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Account Discovery:Cloud Account(Azure)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1087.004_Azure</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1087.004_Azure</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Account Discovery:Cloud Account(Azure)
      <h3>Platform</h3>
      Entra ID
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1087.004_Azure">https://www.tenable.com/attack-path-techniques/T1087.004_Azure</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Forge Web Credentials:SAML Tokens(Azure)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1606.002_Azure</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1606.002_Azure</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Forge Web Credentials:SAML Tokens(Azure)
      <h3>Platform</h3>
      Entra ID
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1606.002_Azure">https://www.tenable.com/attack-path-techniques/T1606.002_Azure</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Group Policy Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1615_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1615_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Group Policy Discovery
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1615_Windows">https://www.tenable.com/attack-path-techniques/T1615_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Valid Accounts: Default Accounts]]></title>
            <link>https://www.tenable.com/attack-path-techniques/1078.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/1078.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Valid Accounts: Default Accounts
      <h3>Platform</h3>
      Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
      <h3>Family</h3>
      Defense Evasion, Persistence, Privilege Escalation, Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/1078.001">https://www.tenable.com/attack-path-techniques/1078.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Denial of Service]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0814_ICS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0814_ICS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Denial of Service
      <h3>Platform</h3>
      OT
      <h3>Family</h3>
      Inhibit Response Function
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0814_ICS">https://www.tenable.com/attack-path-techniques/T0814_ICS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Permission Groups Discovery:Cloud Groups(Azure)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1069.003_Azure</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1069.003_Azure</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Permission Groups Discovery:Cloud Groups(Azure)
      <h3>Platform</h3>
      Entra ID
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1069.003_Azure">https://www.tenable.com/attack-path-techniques/T1069.003_Azure</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Account Manipulation: Additional Cloud Roles (Azure)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1098.003_Azure</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1098.003_Azure</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Account Manipulation: Additional Cloud Roles (Azure)
      <h3>Platform</h3>
      Entra ID
      <h3>Family</h3>
      Persistence, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1098.003_Azure">https://www.tenable.com/attack-path-techniques/T1098.003_Azure</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Domain Policy Modification: Trust Modification(Azure)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1484.002_Azure</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1484.002_Azure</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Domain Policy Modification: Trust Modification(Azure)
      <h3>Platform</h3>
      Entra ID
      <h3>Family</h3>
      Defense Evasion, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1484.002_Azure">https://www.tenable.com/attack-path-techniques/T1484.002_Azure</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1548.005_Azure</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1548.005_Azure</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access
      <h3>Platform</h3>
      Entra ID
      <h3>Family</h3>
      Defense Evasion, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1548.005_Azure">https://www.tenable.com/attack-path-techniques/T1548.005_Azure</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Program Download]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0843_ICS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0843_ICS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Program Download
      <h3>Platform</h3>
      OT
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0843_ICS">https://www.tenable.com/attack-path-techniques/T0843_ICS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation of Remote Services]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0866_ICS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0866_ICS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation of Remote Services
      <h3>Platform</h3>
      OT
      <h3>Family</h3>
      Initial Access, Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0866_ICS">https://www.tenable.com/attack-path-techniques/T0866_ICS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Valid Accounts: Default Accounts]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1078.001_ICS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1078.001_ICS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Valid Accounts: Default Accounts
      <h3>Platform</h3>
      Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
      <h3>Family</h3>
      Defense Evasion, Persistence, Privilege Escalation, Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1078.001_ICS">https://www.tenable.com/attack-path-techniques/T1078.001_ICS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Default Credentials]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0812_ICS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0812_ICS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Default Credentials
      <h3>Platform</h3>
      OT
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0812_ICS">https://www.tenable.com/attack-path-techniques/T0812_ICS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation for Evasion]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0820_ICS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0820_ICS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation for Evasion
      <h3>Platform</h3>
      OT
      <h3>Family</h3>
      Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0820_ICS">https://www.tenable.com/attack-path-techniques/T0820_ICS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Hardcoded Credentials]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0891_ICS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0891_ICS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Hardcoded Credentials
      <h3>Platform</h3>
      OT
      <h3>Family</h3>
      Lateral Movement, Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0891_ICS">https://www.tenable.com/attack-path-techniques/T0891_ICS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Account Manipulation: Additional Cloud Credentials]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1098.001_Azure</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1098.001_Azure</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Account Manipulation: Additional Cloud Credentials
      <h3>Platform</h3>
      Entra ID
      <h3>Family</h3>
      Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1098.001_Azure">https://www.tenable.com/attack-path-techniques/T1098.001_Azure</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploit Public-Facing Application (Aws)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1190_Aws</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1190_Aws</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploit Public-Facing Application (Aws)
      <h3>Platform</h3>
      Aws
      <h3>Family</h3>
      Initial Access, Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1190_Aws">https://www.tenable.com/attack-path-techniques/T1190_Aws</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Gather Victim Host Information: Software]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1592.002_PRE</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1592.002_PRE</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Gather Victim Host Information: Software
      <h3>Platform</h3>
      PRE
      <h3>Family</h3>
      Reconnaissance
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1592.002_PRE">https://www.tenable.com/attack-path-techniques/T1592.002_PRE</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Command and Scripting Interpreter: Unix Shell]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1059.004_Linux</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1059.004_Linux</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Command and Scripting Interpreter: Unix Shell
      <h3>Platform</h3>
      Linux
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1059.004_Linux">https://www.tenable.com/attack-path-techniques/T1059.004_Linux</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Remote Access Software]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1219_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1219_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Remote Access Software
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Command and Control
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1219_Windows">https://www.tenable.com/attack-path-techniques/T1219_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[System Binary Proxy Execution: Msiexec]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1218.007_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1218.007_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      System Binary Proxy Execution: Msiexec
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1218.007_Windows">https://www.tenable.com/attack-path-techniques/T1218.007_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OS Credential Dumping: /etc/passwd and /etc/shadow]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1003.008_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1003.008_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      OS Credential Dumping: /etc/passwd and /etc/shadow
      <h3>Platform</h3>
      Linux
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1003.008_Windows">https://www.tenable.com/attack-path-techniques/T1003.008_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Hijack Execution Flow: Services File Permissions Weakness]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1574.010_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1574.010_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Hijack Execution Flow: Services File Permissions Weakness
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Persistence, Privilege Escalation, Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1574.010_Windows">https://www.tenable.com/attack-path-techniques/T1574.010_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unsecured Credentials: Credentials in Registry
]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1552.002_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1552.002_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Unsecured Credentials: Credentials in Registry

      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1552.002_Windows">https://www.tenable.com/attack-path-techniques/T1552.002_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Command and Scripting Interpreter: Windows Command Shell]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1059.003_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1059.003_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Command and Scripting Interpreter: Windows Command Shell
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1059.003_Windows">https://www.tenable.com/attack-path-techniques/T1059.003_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Credentials from Password Stores: Windows Credential Manager]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1555.004_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1555.004_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Credentials from Password Stores: Windows Credential Manager
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1555.004_Windows">https://www.tenable.com/attack-path-techniques/T1555.004_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Command and Scripting Interpreter: Visual Basic]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1059.005_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1059.005_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Command and Scripting Interpreter: Visual Basic
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1059.005_Windows">https://www.tenable.com/attack-path-techniques/T1059.005_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Material: Application Access Token]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1550.001_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1550.001_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Material: Application Access Token
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Lateral Movement, Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1550.001_Windows">https://www.tenable.com/attack-path-techniques/T1550.001_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud Instance Metadata API]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1552.005_AWS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1552.005_AWS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud Instance Metadata API
      <h3>Platform</h3>
      AWS
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1552.005_AWS">https://www.tenable.com/attack-path-techniques/T1552.005_AWS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Scheduled Task/Job: Scheduled Task]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1053.005_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1053.005_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Scheduled Task/Job: Scheduled Task
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Execution, Persistence, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1053.005_Windows">https://www.tenable.com/attack-path-techniques/T1053.005_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Brute Force: Credential Stuffing (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1110.004_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1110.004_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Brute Force: Credential Stuffing (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1110.004_Windows">https://www.tenable.com/attack-path-techniques/T1110.004_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud Infrastructure Discovery(AWS)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1580_AWS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1580_AWS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud Infrastructure Discovery(AWS)
      <h3>Platform</h3>
      AWS
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1580_AWS">https://www.tenable.com/attack-path-techniques/T1580_AWS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud Storage Object Discovery(AWS)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1619_AWS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1619_AWS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud Storage Object Discovery(AWS)
      <h3>Platform</h3>
      AWS
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1619_AWS">https://www.tenable.com/attack-path-techniques/T1619_AWS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Account Manipulation: Additional Cloud Credentials]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1098.001_AWS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1098.001_AWS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Account Manipulation: Additional Cloud Credentials
      <h3>Platform</h3>
      AWS
      <h3>Family</h3>
      Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1098.001_AWS">https://www.tenable.com/attack-path-techniques/T1098.001_AWS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Serverless Execution]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1648_AWS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1648_AWS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Serverless Execution
      <h3>Platform</h3>
      AWS
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1648_AWS">https://www.tenable.com/attack-path-techniques/T1648_AWS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Data from Cloud Storage Object (AWS)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1530_AWS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1530_AWS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Data from Cloud Storage Object (AWS)
      <h3>Platform</h3>
      AWS
      <h3>Family</h3>
      Collection
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1530_AWS">https://www.tenable.com/attack-path-techniques/T1530_AWS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Account Discovery: Cloud Account (AWS)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1087.004_AWS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1087.004_AWS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Account Discovery: Cloud Account (AWS)
      <h3>Platform</h3>
      AWS
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1087.004_AWS">https://www.tenable.com/attack-path-techniques/T1087.004_AWS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[User Execution: Malicious File (AWS)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1204.002_AWS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1204.002_AWS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      User Execution: Malicious File (AWS)
      <h3>Platform</h3>
      AWS
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1204.002_AWS">https://www.tenable.com/attack-path-techniques/T1204.002_AWS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Permission Groups Discovery: Cloud Groups (AWS)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1069.003_AWS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1069.003_AWS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Permission Groups Discovery: Cloud Groups (AWS)
      <h3>Platform</h3>
      AWS
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1069.003_AWS">https://www.tenable.com/attack-path-techniques/T1069.003_AWS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[External Remote Services]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1133_AWS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1133_AWS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      External Remote Services
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Initial Access, Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1133_AWS">https://www.tenable.com/attack-path-techniques/T1133_AWS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[External Remote Services (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1133_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1133_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      External Remote Services (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Persistence, Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1133_Windows">https://www.tenable.com/attack-path-techniques/T1133_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Steal Application Access Token (AWS)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1528_AWS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1528_AWS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Steal Application Access Token (AWS)
      <h3>Platform</h3>
      AWS
      <h3>Family</h3>
      Collection
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1528_AWS">https://www.tenable.com/attack-path-techniques/T1528_AWS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Transfer Data to Cloud Account]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1537_AWS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1537_AWS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Transfer Data to Cloud Account
      <h3>Platform</h3>
      AWS
      <h3>Family</h3>
      Exfiltration
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1537_AWS">https://www.tenable.com/attack-path-techniques/T1537_AWS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1048.002_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1048.002_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Exfiltration
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1048.002_Windows">https://www.tenable.com/attack-path-techniques/T1048.002_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1048.003_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1048.003_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Exfiltration
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1048.003_Windows">https://www.tenable.com/attack-path-techniques/T1048.003_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1048.001_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1048.001_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Exfiltration
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1048.001_Windows">https://www.tenable.com/attack-path-techniques/T1048.001_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Remote Services: Remote Desktop Protocol]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1021.001_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1021.001_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Remote Services: Remote Desktop Protocol
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1021.001_Windows">https://www.tenable.com/attack-path-techniques/T1021.001_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Remote Services: Windows Remote Management]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1021.006_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1021.006_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Remote Services: Windows Remote Management
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1021.006_Windows">https://www.tenable.com/attack-path-techniques/T1021.006_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation for Privilege Escalation (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1068_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1068_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation for Privilege Escalation (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1068_Windows">https://www.tenable.com/attack-path-techniques/T1068_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Brute Force: Password Guessing (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1110.001_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1110.001_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Brute Force: Password Guessing (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1110.001_Windows">https://www.tenable.com/attack-path-techniques/T1110.001_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Brute Force: Password Spraying (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1110.003_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1110.003_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Brute Force: Password Spraying (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1110.003_Windows">https://www.tenable.com/attack-path-techniques/T1110.003_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploit Public-Facing Application]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1190_WAS</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1190_WAS</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploit Public-Facing Application
      <h3>Platform</h3>
      Web Application
      <h3>Family</h3>
      Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1190_WAS">https://www.tenable.com/attack-path-techniques/T1190_WAS</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation of Remote Services (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1210_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1210_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation of Remote Services (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1210_Windows">https://www.tenable.com/attack-path-techniques/T1210_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Remote Services: SMB/Windows Admin Shares]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1021.002_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1021.002_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Remote Services: SMB/Windows Admin Shares
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1021.002_Windows">https://www.tenable.com/attack-path-techniques/T1021.002_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Hijack Execution Flow: Services Registry Permissions Weakness]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1574.011_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1574.011_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Hijack Execution Flow: Services Registry Permissions Weakness
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Persistence, Privilege Escalation, Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1574.011_Windows">https://www.tenable.com/attack-path-techniques/T1574.011_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OS Credential Dumping: DCSync]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1003.006_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1003.006_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      OS Credential Dumping: DCSync
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1003.006_Windows">https://www.tenable.com/attack-path-techniques/T1003.006_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation for Credential Access (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1212_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1212_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation for Credential Access (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1212_Windows">https://www.tenable.com/attack-path-techniques/T1212_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Abuse Elevation Control Mechanism]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1548_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1548_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Abuse Elevation Control Mechanism
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Privilege Escalation, Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1548_Windows">https://www.tenable.com/attack-path-techniques/T1548_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Steal or Forge Kerberos Tickets: AS-REP Roasting]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1558.004_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1558.004_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Steal or Forge Kerberos Tickets: AS-REP Roasting
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1558.004_Windows">https://www.tenable.com/attack-path-techniques/T1558.004_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Windows Management Instrumentation]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1047_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1047_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Windows Management Instrumentation
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1047_Windows">https://www.tenable.com/attack-path-techniques/T1047_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation for Client Execution (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1203_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1203_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation for Client Execution (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1203_Windows">https://www.tenable.com/attack-path-techniques/T1203_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation for Defense Evasion (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1211_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1211_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation for Defense Evasion (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1211_Windows">https://www.tenable.com/attack-path-techniques/T1211_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OS Credential Dumping: LSASS Memory]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1003.001_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1003.001_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      OS Credential Dumping: LSASS Memory
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1003.001_Windows">https://www.tenable.com/attack-path-techniques/T1003.001_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OS Credential Dumping: LSA Secrets]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1003.004_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1003.004_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      OS Credential Dumping: LSA Secrets
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1003.004_Windows">https://www.tenable.com/attack-path-techniques/T1003.004_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Boot or Logon Initialization Scripts: Network Logon Script (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1037.003_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1037.003_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Boot or Logon Initialization Scripts: Network Logon Script (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Persistence, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1037.003_Windows">https://www.tenable.com/attack-path-techniques/T1037.003_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Command and Scripting Interpreter: PowerShell (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1059.001_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1059.001_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Command and Scripting Interpreter: PowerShell (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1059.001_Windows">https://www.tenable.com/attack-path-techniques/T1059.001_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Command and Scripting Interpreter: Python (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1059.006_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1059.006_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Command and Scripting Interpreter: Python (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1059.006_Windows">https://www.tenable.com/attack-path-techniques/T1059.006_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Valid Accounts: Local Accounts]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1078.003_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1078.003_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Valid Accounts: Local Accounts
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Defense Evasion, Persistence, Privilege Escalation, Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1078.003_Windows">https://www.tenable.com/attack-path-techniques/T1078.003_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Access Token Manipulation: SID-History Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1134.005_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1134.005_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Access Token Manipulation: SID-History Injection
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Defense Evasion, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1134.005_Windows">https://www.tenable.com/attack-path-techniques/T1134.005_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Supply Chain Compromise: Compromise Software Supply Chain]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1195.002_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1195.002_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Supply Chain Compromise: Compromise Software Supply Chain
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1195.002_Windows">https://www.tenable.com/attack-path-techniques/T1195.002_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Rogue Domain Controller]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1207_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1207_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Rogue Domain Controller
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1207_Windows">https://www.tenable.com/attack-path-techniques/T1207_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Steal or Forge Kerberos Tickets: Golden Ticket]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1558.001_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1558.001_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Steal or Forge Kerberos Tickets: Golden Ticket
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1558.001_Windows">https://www.tenable.com/attack-path-techniques/T1558.001_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Domain Trust Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1482_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1482_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Domain Trust Discovery
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1482_Windows">https://www.tenable.com/attack-path-techniques/T1482_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Domain Policy Modification: Group Policy Modification]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1484.001_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1484.001_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Domain Policy Modification: Group Policy Modification
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Defense Evasion, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1484.001_Windows">https://www.tenable.com/attack-path-techniques/T1484.001_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Steal or Forge Kerberos Tickets: Kerberoasting]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1558.003_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1558.003_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Steal or Forge Kerberos Tickets: Kerberoasting
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1558.003_Windows">https://www.tenable.com/attack-path-techniques/T1558.003_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[System Service Discovery (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1007_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1007_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      System Service Discovery (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1007_Windows">https://www.tenable.com/attack-path-techniques/T1007_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Permission Groups Discovery: Local Groups]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1069.001_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1069.001_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Permission Groups Discovery: Local Groups
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1069.001_Windows">https://www.tenable.com/attack-path-techniques/T1069.001_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Network Share Discovery (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1135_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1135_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Network Share Discovery (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1135_Windows">https://www.tenable.com/attack-path-techniques/T1135_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Boot or Logon Autostart Execution: Authentication Package]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1547.002_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1547.002_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Boot or Logon Autostart Execution: Authentication Package
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Persistence, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1547.002_Windows">https://www.tenable.com/attack-path-techniques/T1547.002_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SQL Injection Authentication Bypass]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.113069</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.113069</guid>
            <description><![CDATA[
      <h3>Name</h3>
      SQL Injection Authentication Bypass
      <h3>Platform</h3>
      Web Application
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.113069">https://www.tenable.com/attack-path-techniques/WAS.113069</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SQL Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98115</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98115</guid>
            <description><![CDATA[
      <h3>Name</h3>
      SQL Injection
      <h3>Platform</h3>
      Web Application
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98115">https://www.tenable.com/attack-path-techniques/WAS.98115</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Code Injection (Timing Attack)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98122</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98122</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Code Injection (Timing Attack)
      <h3>Platform</h3>
      Web Application
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98122">https://www.tenable.com/attack-path-techniques/WAS.98122</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Permission Groups Discovery: Domain Groups]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1069.002_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1069.002_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Permission Groups Discovery: Domain Groups
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1069.002_Windows">https://www.tenable.com/attack-path-techniques/T1069.002_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1557.001_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1557.001_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access, Collection
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1557.001_Windows">https://www.tenable.com/attack-path-techniques/T1557.001_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Path Interception by PATH Environment Variable]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1574.007_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1574.007_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Path Interception by PATH Environment Variable
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Persistence, Privilege Escalation, Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1574.007_Windows">https://www.tenable.com/attack-path-techniques/T1574.007_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Client Side Template Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.112684</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.112684</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Client Side Template Injection
      <h3>Platform</h3>
      Web Application
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.112684">https://www.tenable.com/attack-path-techniques/WAS.112684</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Blind XPath Injection (differential analysis)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.113310</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.113310</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Blind XPath Injection (differential analysis)
      <h3>Platform</h3>
      Web Application
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.113310">https://www.tenable.com/attack-path-techniques/WAS.113310</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OS Credential Dumping: Security Account Manager]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1003.002_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1003.002_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      OS Credential Dumping: Security Account Manager
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1003.002_Windows">https://www.tenable.com/attack-path-techniques/T1003.002_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OS Credential Dumping: NTDS]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1003.003_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1003.003_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      OS Credential Dumping: NTDS
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1003.003_Windows">https://www.tenable.com/attack-path-techniques/T1003.003_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Query Registry]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1012_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1012_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Query Registry
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1012_Windows">https://www.tenable.com/attack-path-techniques/T1012_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Network Sniffing (Windows)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1040_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1040_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Network Sniffing (Windows)
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Credential Access, Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1040_Windows">https://www.tenable.com/attack-path-techniques/T1040_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Valid Accounts: Domain Accounts]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1078.002_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1078.002_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Valid Accounts: Domain Accounts
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Defense Evasion, Persistence, Privilege Escalation, Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1078.002_Windows">https://www.tenable.com/attack-path-techniques/T1078.002_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Remote Email Collection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1114.002_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1114.002_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Remote Email Collection
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Collection
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1114.002_Windows">https://www.tenable.com/attack-path-techniques/T1114.002_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Firmware Corruption]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1495_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1495_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Firmware Corruption
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Impact
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1495_Windows">https://www.tenable.com/attack-path-techniques/T1495_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Software Discovery: Security Software Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1518.001_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1518.001_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Software Discovery: Security Software Discovery
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1518.001_Windows">https://www.tenable.com/attack-path-techniques/T1518.001_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Boot or Logon Autostart Execution: Security Support Provider]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1547.005_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1547.005_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Boot or Logon Autostart Execution: Security Support Provider
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Persistence, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1547.005_Windows">https://www.tenable.com/attack-path-techniques/T1547.005_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Path Interception by Unquoted Path]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1574.009_Windows</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1574.009_Windows</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Path Interception by Unquoted Path
      <h3>Platform</h3>
      Windows
      <h3>Family</h3>
      Persistence, Privilege Escalation, Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1574.009_Windows">https://www.tenable.com/attack-path-techniques/T1574.009_Windows</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation for Evasion]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0820</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0820</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation for Evasion
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0820">https://www.tenable.com/attack-path-techniques/T0820</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Program Download]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0843</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0843</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Program Download
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0843">https://www.tenable.com/attack-path-techniques/T0843</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation of Remote Services]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0866</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0866</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation of Remote Services
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Initial Access, Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0866">https://www.tenable.com/attack-path-techniques/T0866</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Account Manager]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1003.002</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1003.002</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Security Account Manager
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1003.002">https://www.tenable.com/attack-path-techniques/T1003.002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[/etc/passwd and /etc/shadow]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1003.008</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1003.008</guid>
            <description><![CDATA[
      <h3>Name</h3>
      /etc/passwd and /etc/shadow
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1003.008">https://www.tenable.com/attack-path-techniques/T1003.008</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Distributed Component Object Model]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1021.003</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1021.003</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Distributed Component Object Model
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1021.003">https://www.tenable.com/attack-path-techniques/T1021.003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exfiltration Over Asymmetric Encrypted Non-C2 Protocol]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1048.002</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1048.002</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Exfiltration
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1048.002">https://www.tenable.com/attack-path-techniques/T1048.002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exfiltration Over Symmetric Encrypted Non-C2 Protocol]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1048.003</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1048.003</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exfiltration Over Symmetric Encrypted Non-C2 Protocol
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Exfiltration
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1048.003">https://www.tenable.com/attack-path-techniques/T1048.003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Scheduled Task]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1053.005</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1053.005</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Scheduled Task
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Execution, Persistence, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1053.005">https://www.tenable.com/attack-path-techniques/T1053.005</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud Groups]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1069.003</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1069.003</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud Groups
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1069.003">https://www.tenable.com/attack-path-techniques/T1069.003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Default Accounts]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1078.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1078.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Default Accounts
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Defense Evasion, Persistence, Privilege Escalation, Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1078.001">https://www.tenable.com/attack-path-techniques/T1078.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud Accounts]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1078.004</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1078.004</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud Accounts
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Defense Evasion, Persistence, Privilege Escalation, Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1078.004">https://www.tenable.com/attack-path-techniques/T1078.004</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Password Spraying]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1110.003</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1110.003</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Password Spraying
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1110.003">https://www.tenable.com/attack-path-techniques/T1110.003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Credential Stuffing]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1110.004</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1110.004</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Credential Stuffing
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1110.004">https://www.tenable.com/attack-path-techniques/T1110.004</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Compromise Software Supply Chain]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1195.002</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1195.002</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Compromise Software Supply Chain
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1195.002">https://www.tenable.com/attack-path-techniques/T1195.002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Windows Credential Manager]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1555.004</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1555.004</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Windows Credential Manager
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1555.004">https://www.tenable.com/attack-path-techniques/T1555.004</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud Secrets Management Stores]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1555.006</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1555.006</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud Secrets Management Stores
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1555.006">https://www.tenable.com/attack-path-techniques/T1555.006</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Runtime Data Manipulation]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1565.003</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1565.003</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Runtime Data Manipulation
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Impact
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1565.003">https://www.tenable.com/attack-path-techniques/T1565.003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Path Interception by PATH Environment Variable]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1574.007</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1574.007</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Path Interception by PATH Environment Variable
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Persistence, Privilege Escalation, Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1574.007">https://www.tenable.com/attack-path-techniques/T1574.007</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Software]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1592.002</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1592.002</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Software
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Reconnaissance
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1592.002">https://www.tenable.com/attack-path-techniques/T1592.002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Scanning IP Blocks]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1595.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1595.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Scanning IP Blocks
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Reconnaissance
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1595.001">https://www.tenable.com/attack-path-techniques/T1595.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Server Side Request Forgery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.112439</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.112439</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Server Side Request Forgery
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Server-Side Request Forgery (SSRF)
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.112439">https://www.tenable.com/attack-path-techniques/WAS.112439</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Content Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.113212</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.113212</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Content Injection
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.113212">https://www.tenable.com/attack-path-techniques/WAS.113212</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Code Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98120</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98120</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Code Injection
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98120">https://www.tenable.com/attack-path-techniques/WAS.98120</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Operating System Command Injection (Timing Attack)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98124</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98124</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Operating System Command Injection (Timing Attack)
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98124">https://www.tenable.com/attack-path-techniques/WAS.98124</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Network Logon Script]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1037.003</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1037.003</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Network Logon Script
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Persistence, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1037.003">https://www.tenable.com/attack-path-techniques/T1037.003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Network Sniffing]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1040</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1040</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Network Sniffing
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access, Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1040">https://www.tenable.com/attack-path-techniques/T1040</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Domain Groups]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1069.002</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1069.002</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Domain Groups
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1069.002">https://www.tenable.com/attack-path-techniques/T1069.002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation for Client Execution]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1203</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1203</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation for Client Execution
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1203">https://www.tenable.com/attack-path-techniques/T1203</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Steal Application Access Token]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1528</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1528</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Steal Application Access Token
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Collection
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1528">https://www.tenable.com/attack-path-techniques/T1528</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Support Provider]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1547.005</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1547.005</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Security Support Provider
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Persistence, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1547.005">https://www.tenable.com/attack-path-techniques/T1547.005</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Abuse Elevation Control Mechanism]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1548</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1548</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Abuse Elevation Control Mechanism
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Privilege Escalation, Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1548">https://www.tenable.com/attack-path-techniques/T1548</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Pass the Ticket]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1550.003</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1550.003</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Pass the Ticket
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Defense Evasion, Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1550.003">https://www.tenable.com/attack-path-techniques/T1550.003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud Instance Metadata API]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1552.005</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1552.005</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud Instance Metadata API
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1552.005">https://www.tenable.com/attack-path-techniques/T1552.005</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Domain Controller Authentication]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1556.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1556.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Domain Controller Authentication
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access, Defense Evasion, Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1556.001">https://www.tenable.com/attack-path-techniques/T1556.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SAML Tokens]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1606.002</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1606.002</guid>
            <description><![CDATA[
      <h3>Name</h3>
      SAML Tokens
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1606.002">https://www.tenable.com/attack-path-techniques/T1606.002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Server-Side Template Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.112614</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.112614</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Server-Side Template Injection
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.112614">https://www.tenable.com/attack-path-techniques/WAS.112614</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[XPath Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98114</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98114</guid>
            <description><![CDATA[
      <h3>Name</h3>
      XPath Injection
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98114">https://www.tenable.com/attack-path-techniques/WAS.98114</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Blind SQL Injection (differential analysis)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98117</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98117</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Blind SQL Injection (differential analysis)
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98117">https://www.tenable.com/attack-path-techniques/WAS.98117</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Blind SQL Injection (timing attack)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98118</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98118</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Blind SQL Injection (timing attack)
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98118">https://www.tenable.com/attack-path-techniques/WAS.98118</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Host Header Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98623</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98623</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Host Header Injection
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98623">https://www.tenable.com/attack-path-techniques/WAS.98623</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Default Credentials]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0812</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0812</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Default Credentials
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0812">https://www.tenable.com/attack-path-techniques/T0812</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Remote System Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0846</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0846</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Remote System Discovery
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0846">https://www.tenable.com/attack-path-techniques/T0846</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Hardcoded Credentials]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0891</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0891</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Hardcoded Credentials
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Lateral Movement, Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0891">https://www.tenable.com/attack-path-techniques/T0891</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[NTDS]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1003.003</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1003.003</guid>
            <description><![CDATA[
      <h3>Name</h3>
      NTDS
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1003.003">https://www.tenable.com/attack-path-techniques/T1003.003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[LSA Secrets]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1003.004</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1003.004</guid>
            <description><![CDATA[
      <h3>Name</h3>
      LSA Secrets
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1003.004">https://www.tenable.com/attack-path-techniques/T1003.004</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[System Service Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1007</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1007</guid>
            <description><![CDATA[
      <h3>Name</h3>
      System Service Discovery
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1007">https://www.tenable.com/attack-path-techniques/T1007</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SMB/Windows Admin Shares]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1021.002</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1021.002</guid>
            <description><![CDATA[
      <h3>Name</h3>
      SMB/Windows Admin Shares
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1021.002">https://www.tenable.com/attack-path-techniques/T1021.002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Windows Remote Management]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1021.006</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1021.006</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Windows Remote Management
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1021.006">https://www.tenable.com/attack-path-techniques/T1021.006</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Windows Management Instrumentation]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1047</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1047</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Windows Management Instrumentation
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1047">https://www.tenable.com/attack-path-techniques/T1047</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Windows Command Shell]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1059.003</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1059.003</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Windows Command Shell
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1059.003">https://www.tenable.com/attack-path-techniques/T1059.003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Python]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1059.006</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1059.006</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Python
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1059.006">https://www.tenable.com/attack-path-techniques/T1059.006</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Software Deployment Tools]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1072</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1072</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Software Deployment Tools
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Execution, Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1072">https://www.tenable.com/attack-path-techniques/T1072</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud Account]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1087.004</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1087.004</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud Account
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1087.004">https://www.tenable.com/attack-path-techniques/T1087.004</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Password Guessing]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1110.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1110.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Password Guessing
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1110.001">https://www.tenable.com/attack-path-techniques/T1110.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[External Remote Services]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1133</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1133</guid>
            <description><![CDATA[
      <h3>Name</h3>
      External Remote Services
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Persistence, Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1133">https://www.tenable.com/attack-path-techniques/T1133</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Network Share Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1135</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1135</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Network Share Discovery
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1135">https://www.tenable.com/attack-path-techniques/T1135</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploit Public-Facing Application]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1190</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1190</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploit Public-Facing Application
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Initial Access, Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1190">https://www.tenable.com/attack-path-techniques/T1190</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Credentials in Registry]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1552.002</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1552.002</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Credentials in Registry
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1552.002">https://www.tenable.com/attack-path-techniques/T1552.002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud Infrastructure Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1580</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1580</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud Infrastructure Discovery
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1580">https://www.tenable.com/attack-path-techniques/T1580</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Expression Language Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.113317</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.113317</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Expression Language Injection
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.113317">https://www.tenable.com/attack-path-techniques/WAS.113317</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Blind NoSQL Injection (differential analysis)]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98119</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98119</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Blind NoSQL Injection (differential analysis)
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98119">https://www.tenable.com/attack-path-techniques/WAS.98119</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Code Injection (Php--input Wrapper]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98121</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98121</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Code Injection (Php--input Wrapper
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98121">https://www.tenable.com/attack-path-techniques/WAS.98121</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation for Credential Access]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1212</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1212</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation for Credential Access
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1212">https://www.tenable.com/attack-path-techniques/T1212</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[LLMNR/NBT-NS Poisoning and SMB Relay]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1557.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1557.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      LLMNR/NBT-NS Poisoning and SMB Relay
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access, Collection
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1557.001">https://www.tenable.com/attack-path-techniques/T1557.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Denial of Service]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0814</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0814</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Denial of Service
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Inhibit Response Function
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0814">https://www.tenable.com/attack-path-techniques/T0814</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[External Remote Services]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T0822</link>
            <guid>https://www.tenable.com/attack-path-techniques/T0822</guid>
            <description><![CDATA[
      <h3>Name</h3>
      External Remote Services
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T0822">https://www.tenable.com/attack-path-techniques/T0822</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Query Registry]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1012</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1012</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Query Registry
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1012">https://www.tenable.com/attack-path-techniques/T1012</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exfiltration Over Symmetric Encrypted Non-C2 Protocol]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1048.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1048.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exfiltration Over Symmetric Encrypted Non-C2 Protocol
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Exfiltration
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1048.001">https://www.tenable.com/attack-path-techniques/T1048.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Powershell]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1059.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1059.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Powershell
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1059.001">https://www.tenable.com/attack-path-techniques/T1059.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Local Accounts]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1078.003</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1078.003</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Local Accounts
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Defense Evasion, Persistence, Privilege Escalation, Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1078.003">https://www.tenable.com/attack-path-techniques/T1078.003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Additional Cloud Credentials]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1098.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1098.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Additional Cloud Credentials
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1098.001">https://www.tenable.com/attack-path-techniques/T1098.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Additional Cloud Roles]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1098.003</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1098.003</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Additional Cloud Roles
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Persistence, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1098.003">https://www.tenable.com/attack-path-techniques/T1098.003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SSH Authorized Keys]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1098.004</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1098.004</guid>
            <description><![CDATA[
      <h3>Name</h3>
      SSH Authorized Keys
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Privilege Escalation, Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1098.004">https://www.tenable.com/attack-path-techniques/T1098.004</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Msiexec]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1218.007</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1218.007</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Msiexec
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1218.007">https://www.tenable.com/attack-path-techniques/T1218.007</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Domain Trust Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1482</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1482</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Domain Trust Discovery
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1482">https://www.tenable.com/attack-path-techniques/T1482</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Firmware Corruption]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1495</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1495</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Firmware Corruption
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Impact
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1495">https://www.tenable.com/attack-path-techniques/T1495</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Transfer Data to Cloud Account]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1537</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1537</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Transfer Data to Cloud Account
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Exfiltration
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1537">https://www.tenable.com/attack-path-techniques/T1537</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Hybrid Identity]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1556.007</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1556.007</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Hybrid Identity
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access, Defense Evasion, Persistence
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1556.007">https://www.tenable.com/attack-path-techniques/T1556.007</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kerberoasting]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1558.003</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1558.003</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Kerberoasting
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1558.003">https://www.tenable.com/attack-path-techniques/T1558.003</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Services File Permissions Weakness]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1574.010</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1574.010</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Services File Permissions Weakness
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Persistence, Privilege Escalation, Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1574.010">https://www.tenable.com/attack-path-techniques/T1574.010</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud Storage Object Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1619</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1619</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud Storage Object Discovery
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1619">https://www.tenable.com/attack-path-techniques/T1619</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Serverless Execution]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1648</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1648</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Serverless Execution
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1648">https://www.tenable.com/attack-path-techniques/T1648</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Steal or Forge Authentication Certificates]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1649</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1649</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Steal or Forge Authentication Certificates
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1649">https://www.tenable.com/attack-path-techniques/T1649</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Server-Side Inclusion Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.113634</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.113634</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Server-Side Inclusion Injection
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.113634">https://www.tenable.com/attack-path-techniques/WAS.113634</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[LDAP Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98127</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98127</guid>
            <description><![CDATA[
      <h3>Name</h3>
      LDAP Injection
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98127">https://www.tenable.com/attack-path-techniques/WAS.98127</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[LSASS Memory]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1003.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1003.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      LSASS Memory
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1003.001">https://www.tenable.com/attack-path-techniques/T1003.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[DCSync]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1003.006</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1003.006</guid>
            <description><![CDATA[
      <h3>Name</h3>
      DCSync
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1003.006">https://www.tenable.com/attack-path-techniques/T1003.006</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Remote Desktop Protocol]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1021.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1021.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Remote Desktop Protocol
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1021.001">https://www.tenable.com/attack-path-techniques/T1021.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud Services]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1021.007</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1021.007</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud Services
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1021.007">https://www.tenable.com/attack-path-techniques/T1021.007</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unix Shell]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1059.004</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1059.004</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Unix Shell
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1059.004">https://www.tenable.com/attack-path-techniques/T1059.004</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Windows Command Shell]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1059.005</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1059.005</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Windows Command Shell
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1059.005">https://www.tenable.com/attack-path-techniques/T1059.005</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation for Privilege Escalation]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1068</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1068</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation for Privilege Escalation
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1068">https://www.tenable.com/attack-path-techniques/T1068</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Local Groups]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1069.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1069.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Local Groups
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1069.001">https://www.tenable.com/attack-path-techniques/T1069.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Domain Accounts]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1078.002</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1078.002</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Domain Accounts
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Defense Evasion, Persistence, Privilege Escalation, Initial Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1078.002">https://www.tenable.com/attack-path-techniques/T1078.002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[System Information Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1082</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1082</guid>
            <description><![CDATA[
      <h3>Name</h3>
      System Information Discovery
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1082">https://www.tenable.com/attack-path-techniques/T1082</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[File and Directory Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1083</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1083</guid>
            <description><![CDATA[
      <h3>Name</h3>
      File and Directory Discovery
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1083">https://www.tenable.com/attack-path-techniques/T1083</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Remote Email Collection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1114.002</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1114.002</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Remote Email Collection
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Collection
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1114.002">https://www.tenable.com/attack-path-techniques/T1114.002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SID-History Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1134.005</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1134.005</guid>
            <description><![CDATA[
      <h3>Name</h3>
      SID-History Injection
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Defense Evasion, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1134.005">https://www.tenable.com/attack-path-techniques/T1134.005</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Rogue Domain Controller]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1207</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1207</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Rogue Domain Controller
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1207">https://www.tenable.com/attack-path-techniques/T1207</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation for Defense Evasion]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1211</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1211</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation for Defense Evasion
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1211">https://www.tenable.com/attack-path-techniques/T1211</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Remote Access Software]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1219</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1219</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Remote Access Software
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Command and Control
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1219">https://www.tenable.com/attack-path-techniques/T1219</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Group Policy Modification]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1484.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1484.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Group Policy Modification
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Defense Evasion, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1484.001">https://www.tenable.com/attack-path-techniques/T1484.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Trust Modification]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1484.002</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1484.002</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Trust Modification
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Defense Evasion, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1484.002">https://www.tenable.com/attack-path-techniques/T1484.002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Application or System Exploitation]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1499.004</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1499.004</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Application or System Exploitation
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Impact
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1499.004">https://www.tenable.com/attack-path-techniques/T1499.004</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Software Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1518.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1518.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Security Software Discovery
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1518.001">https://www.tenable.com/attack-path-techniques/T1518.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud Service Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1526</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1526</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud Service Discovery
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1526">https://www.tenable.com/attack-path-techniques/T1526</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Data from Cloud Storage]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1530</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1530</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Data from Cloud Storage
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Collection
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1530">https://www.tenable.com/attack-path-techniques/T1530</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Authentication Package]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1547.002</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1547.002</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Authentication Package
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Persistence, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1547.002">https://www.tenable.com/attack-path-techniques/T1547.002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Temporary Elevated Cloud Access]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1548.005</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1548.005</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Temporary Elevated Cloud Access
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Defense Evasion, Privilege Escalation
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1548.005">https://www.tenable.com/attack-path-techniques/T1548.005</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Application Access Token]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1550.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1550.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Application Access Token
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Lateral Movement, Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1550.001">https://www.tenable.com/attack-path-techniques/T1550.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Golden Ticket]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1558.001</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1558.001</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Golden Ticket
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1558.001">https://www.tenable.com/attack-path-techniques/T1558.001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AS-REP Roasting]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1558.004</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1558.004</guid>
            <description><![CDATA[
      <h3>Name</h3>
      AS-REP Roasting
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Credential Access
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1558.004">https://www.tenable.com/attack-path-techniques/T1558.004</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Path Interception by Unquoted Path]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1574.009</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1574.009</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Path Interception by Unquoted Path
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Persistence, Privilege Escalation, Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1574.009">https://www.tenable.com/attack-path-techniques/T1574.009</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Services Registry Permissions Weakness]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1574.011</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1574.011</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Services Registry Permissions Weakness
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Persistence, Privilege Escalation, Defense Evasion
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1574.011">https://www.tenable.com/attack-path-techniques/T1574.011</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Group Policy Discovery]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1615</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1615</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Group Policy Discovery
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Discovery
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1615">https://www.tenable.com/attack-path-techniques/T1615</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MySQLjs SQL Injection Authentication Bypass]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.113162</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.113162</guid>
            <description><![CDATA[
      <h3>Name</h3>
      MySQLjs SQL Injection Authentication Bypass
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.113162">https://www.tenable.com/attack-path-techniques/WAS.113162</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[XML External Entity]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98113</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98113</guid>
            <description><![CDATA[
      <h3>Name</h3>
      XML External Entity
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Security Misconfiguration
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98113">https://www.tenable.com/attack-path-techniques/WAS.98113</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[NoSQL Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98116</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98116</guid>
            <description><![CDATA[
      <h3>Name</h3>
      NoSQL Injection
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98116">https://www.tenable.com/attack-path-techniques/WAS.98116</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Operating System Command Injection]]></title>
            <link>https://www.tenable.com/attack-path-techniques/WAS.98123</link>
            <guid>https://www.tenable.com/attack-path-techniques/WAS.98123</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Operating System Command Injection
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Injection
      <h3>Framework</h3>
      OWASP

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/WAS.98123">https://www.tenable.com/attack-path-techniques/WAS.98123</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cloud API]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1059.009</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1059.009</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Cloud API
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Execution
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1059.009">https://www.tenable.com/attack-path-techniques/T1059.009</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exploitation of Remote Services]]></title>
            <link>https://www.tenable.com/attack-path-techniques/T1210</link>
            <guid>https://www.tenable.com/attack-path-techniques/T1210</guid>
            <description><![CDATA[
      <h3>Name</h3>
      Exploitation of Remote Services
      <h3>Platform</h3>
      
      <h3>Family</h3>
      Lateral Movement
      <h3>Framework</h3>
      MITRE ATT&CK

      <p>Read more at <a href="https://www.tenable.com/attack-path-techniques/T1210">https://www.tenable.com/attack-path-techniques/T1210</a></p>
    ]]></description>
        </item>
    </channel>
</rss>