As part of a typical attack, adversaries leverage different tools and techniques to accomplish their objectives. Usually, a hacker attains an initial foothold over the network, whether by a phishing attack or exploiting a publicly exposed vulnerability. Hackers may then seem to maintain access over the machine (Persistence), elevate their privileges, and laterally pivot between network devices (Lateral Movement). Last, the hacker tries to complete their objective, for example, a denial of service of critical infrastructure, exfiltration of sensitive information, or distraction of existing services. This event is known as Attack Path. An attack path contains one or more Attack Techniques, allowing the hacker to accomplish his objective.
| ID | Name | Platform | Family | Framework |
|---|---|---|---|---|
| T1082 | System Information Discovery | Discovery | MITRE ATT&CK | |
| T1083 | File and Directory Discovery | Discovery | MITRE ATT&CK | |
| T1114.002 | Remote Email Collection | Collection | MITRE ATT&CK | |
| T1134.005 | SID-History Injection | Defense Evasion, Privilege Escalation | MITRE ATT&CK | |
| T1207 | Rogue Domain Controller | Defense Evasion | MITRE ATT&CK | |
| T1211 | Exploitation for Defense Evasion | Defense Evasion | MITRE ATT&CK | |
| T1219 | Remote Access Software | Command and Control | MITRE ATT&CK | |
| T1484.001 | Group Policy Modification | Defense Evasion, Privilege Escalation | MITRE ATT&CK | |
| T1484.002 | Trust Modification | Defense Evasion, Privilege Escalation | MITRE ATT&CK | |
| T1499.004 | Application or System Exploitation | Impact | MITRE ATT&CK | |
| T1518.001 | Security Software Discovery | Discovery | MITRE ATT&CK | |
| T1526 | Cloud Service Discovery | Discovery | MITRE ATT&CK | |
| T1530 | Data from Cloud Storage | Collection | MITRE ATT&CK | |
| T1547.002 | Authentication Package | Persistence, Privilege Escalation | MITRE ATT&CK | |
| T1548.005 | Temporary Elevated Cloud Access | Defense Evasion, Privilege Escalation | MITRE ATT&CK | |
| T1550.001 | Application Access Token | Lateral Movement, Defense Evasion | MITRE ATT&CK | |
| T1558.001 | Golden Ticket | Credential Access | MITRE ATT&CK | |
| T1558.004 | AS-REP Roasting | MITRE ATT&CK | ||
| T1574.009 | Path Interception by Unquoted Path | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK | |
| T1574.011 | Services Registry Permissions Weakness | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK | |
| T1615 | Group Policy Discovery | Discovery | MITRE ATT&CK | |
| WAS.113162 | MySQLjs SQL Injection Authentication Bypass | Injection | OWASP | |
| WAS.98113 | XML External Entity | Security Misconfiguration | OWASP | |
| WAS.98116 | NoSQL Injection | Injection | OWASP | |
| WAS.98123 | Operating System Command Injection | Injection | OWASP | |
| T1059.009 | Cloud API | Execution | MITRE ATT&CK | |
| T1210 | Exploitation of Remote Services | Lateral Movement | MITRE ATT&CK |