Attack Path Techniques

As part of a typical attack, adversaries leverage different tools and techniques to accomplish their objectives. Usually, a hacker attains an initial foothold over the network, whether by a phishing attack or exploiting a publicly exposed vulnerability. Hackers may then seem to maintain access over the machine (Persistence), elevate their privileges, and laterally pivot between network devices (Lateral Movement). Last, the hacker tries to complete their objective, for example, a denial of service of critical infrastructure, exfiltration of sensitive information, or distraction of existing services. This event is known as Attack Path. An attack path contains one or more Attack Techniques, allowing the hacker to accomplish his objective.

Search

IDNamePlatformFamilyFramework
T1114.002_WindowsRemote Email CollectionWindowsCollectionMITRE ATT&CK
T1495_WindowsFirmware CorruptionWindowsImpactMITRE ATT&CK
T1518.001_WindowsSoftware Discovery: Security Software DiscoveryWindowsDiscoveryMITRE ATT&CK
T1547.005_WindowsBoot or Logon Autostart Execution: Security Support ProviderWindowsPersistence, Privilege EscalationMITRE ATT&CK
T1574.009_WindowsPath Interception by Unquoted PathWindowsPersistence, Privilege Escalation, Defense EvasionMITRE ATT&CK
T0820Exploitation for EvasionEvasionMITRE ATT&CK
T0843Program DownloadLateral MovementMITRE ATT&CK
T0866Exploitation of Remote ServicesInitial Access, Lateral MovementMITRE ATT&CK
T1003.002Security Account ManagerCredential AccessMITRE ATT&CK
T1003.008/etc/passwd and /etc/shadowCredential AccessMITRE ATT&CK
T1021.003Distributed Component Object ModelLateral MovementMITRE ATT&CK
T1048.002Exfiltration Over Asymmetric Encrypted Non-C2 ProtocolExfiltrationMITRE ATT&CK
T1048.003Exfiltration Over Symmetric Encrypted Non-C2 ProtocolExfiltrationMITRE ATT&CK
T1053.005Scheduled TaskExecution, Persistence, Privilege EscalationMITRE ATT&CK
T1069.003Cloud GroupsDiscoveryMITRE ATT&CK
T1078.001Default AccountsDefense Evasion, Persistence, Privilege Escalation, Initial AccessMITRE ATT&CK
T1078.004Cloud AccountsDefense Evasion, Persistence, Privilege Escalation, Initial AccessMITRE ATT&CK
T1110.003Password SprayingCredential AccessMITRE ATT&CK
T1110.004Credential StuffingCredential AccessMITRE ATT&CK
T1195.002Compromise Software Supply ChainInitial AccessMITRE ATT&CK
T1555.004Windows Credential ManagerCredential AccessMITRE ATT&CK
T1555.006Cloud Secrets Management StoresCredential AccessMITRE ATT&CK
T1565.003Runtime Data ManipulationImpactMITRE ATT&CK
T1574.007Path Interception by PATH Environment VariablePersistence, Privilege Escalation, Defense EvasionMITRE ATT&CK
T1592.002SoftwareReconnaissanceMITRE ATT&CK
T1595.001Scanning IP BlocksReconnaissanceMITRE ATT&CK
WAS.112439Server Side Request ForgeryServer-Side Request Forgery (SSRF)OWASP
WAS.113212Content InjectionInjectionOWASP
WAS.98120Code InjectionInjectionOWASP
WAS.98124Operating System Command Injection (Timing Attack)InjectionOWASP
T1037.003Network Logon ScriptPersistence, Privilege EscalationMITRE ATT&CK
T1040Network SniffingCredential Access, DiscoveryMITRE ATT&CK
T1069.002Domain GroupsDiscoveryMITRE ATT&CK
T1203Exploitation for Client ExecutionExecutionMITRE ATT&CK
T1528Steal Application Access TokenCollectionMITRE ATT&CK
T1547.005Security Support ProviderPersistence, Privilege EscalationMITRE ATT&CK
T1548Abuse Elevation Control MechanismPrivilege Escalation, Defense EvasionMITRE ATT&CK
T1550.003Pass the TicketDefense Evasion, Lateral MovementMITRE ATT&CK
T1552.005Cloud Instance Metadata APICredential AccessMITRE ATT&CK
T1556.001Domain Controller AuthenticationCredential Access, Defense Evasion, PersistenceMITRE ATT&CK
T1606.002SAML TokensCredential AccessMITRE ATT&CK
WAS.112614Server-Side Template InjectionInjectionOWASP
WAS.98114XPath InjectionInjectionOWASP
WAS.98117Blind SQL Injection (differential analysis)InjectionOWASP
WAS.98118Blind SQL Injection (timing attack)InjectionOWASP
WAS.98623Host Header InjectionInjectionOWASP
T0812Default CredentialsLateral MovementMITRE ATT&CK
T0846Remote System DiscoveryDiscoveryMITRE ATT&CK
T0891Hardcoded CredentialsLateral Movement, PersistenceMITRE ATT&CK
T1003.003NTDSCredential AccessMITRE ATT&CK