T1059.004 | Unix Shell | | Execution | MITRE ATT&CK |
T1059.006 | Python | | Execution | MITRE ATT&CK |
T1069.001 | Local Groups | | Discovery | MITRE ATT&CK |
T1203 | Exploitation for Client Execution | | Execution | MITRE ATT&CK |
T1518.001 | Security Software Discovery | | Discovery | MITRE ATT&CK |
T1547.002 | Authentication Package | | Persistence, Privilege Escalation | MITRE ATT&CK |
T1552.005 | Cloud Instance Metadata API | | Credential Access | MITRE ATT&CK |
T1574.010_Windows | Hijack Execution Flow: Services File Permissions Weakness | Windows | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
T1003.004 | LSA Secrets | | Credential Access | MITRE ATT&CK |
T1574.010 | Services File Permissions Weakness | | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK |
T1003.003_Windows | OS Credential Dumping: NTDS | Windows | Credential Access | MITRE ATT&CK |
T1484.002_Azure | Domain Policy Modification: Trust Modification(Azure) | Entra ID | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
T1557.001_Windows | Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay | Windows | Credential Access, Collection | MITRE ATT&CK |
T0820 | Exploitation for Evasion | | Evasion | MITRE ATT&CK |
T1484.002 | Trust Modification | | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
T1557.001 | LLMNR/NBT-NS Poisoning and SMB Relay | | Credential Access, Collection | MITRE ATT&CK |
T0820_ICS | Exploitation for Evasion | OT | Evasion | MITRE ATT&CK |
T0845_ICS | Program Upload | OT | Collection | MITRE ATT&CK |
T0814 | Denial of Service | | Inhibit Response Function | MITRE ATT&CK |
T0891 | Hardcoded Credentials | | Lateral Movement, Persistence | MITRE ATT&CK |
T1078.002 | Domain Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
T0812_ICS | Default Credentials | OT | Lateral Movement | MITRE ATT&CK |
T0843_ICS | Program Download | OT | Lateral Movement | MITRE ATT&CK |
T0866_ICS | Exploitation of Remote Services | OT | Initial Access, Lateral Movement | MITRE ATT&CK |
T1069.002_Windows | Permission Groups Discovery: Domain Groups | Windows | Discovery | MITRE ATT&CK |
T1550.001_Windows | Material: Application Access Token | Windows | Lateral Movement, Defense Evasion | MITRE ATT&CK |
T1528_AWS | Steal Application Access Token (AWS) | AWS | Collection | MITRE ATT&CK |
T0843 | Program Download | | Lateral Movement | MITRE ATT&CK |
T1082 | System Information Discovery | | Discovery | MITRE ATT&CK |
T1556.007 | Hybrid Identity | | Credential Access, Defense Evasion, Persistence | MITRE ATT&CK |
T1526 | Cloud Service Discovery | | Discovery | MITRE ATT&CK |
T1003.006_Windows | OS Credential Dumping: DCSync | Windows | Credential Access | MITRE ATT&CK |
T1087.004_AWS | Account Discovery: Cloud Account (AWS) | AWS | Discovery | MITRE ATT&CK |
T1114.002_Windows | Remote Email Collection | Windows | Collection | MITRE ATT&CK |
T1204.002_AWS | User Execution: Malicious File (AWS) | AWS | Execution | MITRE ATT&CK |
T1207_Windows | Rogue Domain Controller | Windows | Defense Evasion | MITRE ATT&CK |
T1548.005_Azure | Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access | Entra ID | Defense Evasion, Privilege Escalation | MITRE ATT&CK |
T1548_Windows | Abuse Elevation Control Mechanism | Windows | Privilege Escalation, Defense Evasion | MITRE ATT&CK |
T1558.003_Windows | Steal or Forge Kerberos Tickets: Kerberoasting | Windows | Credential Access | MITRE ATT&CK |
T1648_AWS | Serverless Execution | AWS | Execution | MITRE ATT&CK |
T0846 | Remote System Discovery | | Discovery | MITRE ATT&CK |
T1021.007 | Cloud Services | | Lateral Movement | MITRE ATT&CK |
T1098.004 | SSH Authorized Keys | | Privilege Escalation, Persistence | MITRE ATT&CK |
T1558.003 | Kerberoasting | | Credential Access | MITRE ATT&CK |
T1078.004 | Cloud Accounts | | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
T1098.003 | Additional Cloud Roles | | Persistence, Privilege Escalation | MITRE ATT&CK |
T1078.004_Azure | Valid Accounts: Cloud Accounts | Entra ID | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK |
T1087.004 | Cloud Account | | Discovery | MITRE ATT&CK |
T1098.001_AWS | Account Manipulation: Additional Cloud Credentials | AWS | Persistence | MITRE ATT&CK |
T1098.003_Azure | Account Manipulation: Additional Cloud Roles (Azure) | Entra ID | Persistence, Privilege Escalation | MITRE ATT&CK |