Attack Path Techniques Search

IDNamePlatformFamilyFramework
T1606.002_AzureForge Web Credentials:SAML Tokens(Azure)Entra IDCredential AccessMITRE ATT&CK
T1021.003Distributed Component Object ModelLateral MovementMITRE ATT&CK
T1040Network SniffingCredential Access, DiscoveryMITRE ATT&CK
T1047Windows Management InstrumentationExecutionMITRE ATT&CK
T1048.003Exfiltration Over Symmetric Encrypted Non-C2 ProtocolExfiltrationMITRE ATT&CK
T1059.005Windows Command ShellExecutionMITRE ATT&CK
T1211Exploitation for Defense EvasionDefense EvasionMITRE ATT&CK
T1218.007MsiexecDefense EvasionMITRE ATT&CK
T1219Remote Access SoftwareCommand and ControlMITRE ATT&CK
T1547.005Security Support ProviderPersistence, Privilege EscalationMITRE ATT&CK
T1552.002Credentials in RegistryCredential AccessMITRE ATT&CK
T1574.009Path Interception by Unquoted PathPersistence, Privilege Escalation, Defense EvasionMITRE ATT&CK
T1592.002_PREGather Victim Host Information: SoftwarePREReconnaissanceMITRE ATT&CK
WAS.112684Client Side Template InjectionWeb ApplicationInjectionOWASP
T1592.002SoftwareReconnaissanceMITRE ATT&CK
WAS.113634Server-Side Inclusion InjectionInjectionOWASP
WAS.98117Blind SQL Injection (differential analysis)InjectionOWASP
WAS.98118Blind SQL Injection (timing attack)InjectionOWASP
WAS.98127LDAP InjectionInjectionOWASP
T1012_WindowsQuery RegistryWindowsDiscoveryMITRE ATT&CK
T1048.003_WindowsExfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol (Windows)WindowsExfiltrationMITRE ATT&CK
T1059.003_WindowsCommand and Scripting Interpreter: Windows Command ShellWindowsExecutionMITRE ATT&CK
T1078.003_WindowsValid Accounts: Local AccountsWindowsDefense Evasion, Persistence, Privilege Escalation, Initial AccessMITRE ATT&CK
T1203_WindowsExploitation for Client Execution (Windows)WindowsExecutionMITRE ATT&CK
T1495_WindowsFirmware CorruptionWindowsImpactMITRE ATT&CK
T1574.011_WindowsHijack Execution Flow: Services Registry Permissions WeaknessWindowsPersistence, Privilege Escalation, Defense EvasionMITRE ATT&CK
T1021.002SMB/Windows Admin SharesLateral MovementMITRE ATT&CK
T1048.001Exfiltration Over Symmetric Encrypted Non-C2 ProtocolExfiltrationMITRE ATT&CK
T1135Network Share DiscoveryDiscoveryMITRE ATT&CK
T1195.002Compromise Software Supply ChainInitial AccessMITRE ATT&CK
T1210Exploitation of Remote ServicesLateral MovementMITRE ATT&CK
T1574.011Services Registry Permissions WeaknessPersistence, Privilege Escalation, Defense EvasionMITRE ATT&CK
T1606.002SAML TokensCredential AccessMITRE ATT&CK
T1003.001_WindowsOS Credential Dumping: LSASS MemoryWindowsCredential AccessMITRE ATT&CK
T1003.002_WindowsOS Credential Dumping: Security Account ManagerWindowsCredential AccessMITRE ATT&CK
T1021.002_WindowsRemote Services: SMB/Windows Admin SharesWindowsLateral MovementMITRE ATT&CK
T1047_WindowsWindows Management InstrumentationWindowsExecutionMITRE ATT&CK
T1048.002_WindowsExfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol (Windows)WindowsExfiltrationMITRE ATT&CK
T1053.005_WindowsScheduled Task/Job: Scheduled TaskWindowsExecution, Persistence, Privilege EscalationMITRE ATT&CK
T1059.001_WindowsCommand and Scripting Interpreter: PowerShell (Windows)WindowsExecutionMITRE ATT&CK
T1211_WindowsExploitation for Defense Evasion (Windows)WindowsDefense EvasionMITRE ATT&CK
T1547.002_WindowsBoot or Logon Autostart Execution: Authentication PackageWindowsPersistence, Privilege EscalationMITRE ATT&CK
T1547.005_WindowsBoot or Logon Autostart Execution: Security Support ProviderWindowsPersistence, Privilege EscalationMITRE ATT&CK
T1135_WindowsNetwork Share Discovery (Windows)WindowsDiscoveryMITRE ATT&CK
T1012Query RegistryDiscoveryMITRE ATT&CK
T1048.002Exfiltration Over Asymmetric Encrypted Non-C2 ProtocolExfiltrationMITRE ATT&CK
T1059.003Windows Command ShellExecutionMITRE ATT&CK
T1068Exploitation for Privilege EscalationPrivilege EscalationMITRE ATT&CK
T1078.001Default AccountsDefense Evasion, Persistence, Privilege Escalation, Initial AccessMITRE ATT&CK
T1078.003Local AccountsDefense Evasion, Persistence, Privilege Escalation, Initial AccessMITRE ATT&CK