Attack Path Techniques

As part of a typical attack, adversaries leverage different tools and techniques to accomplish their objectives. Usually, a hacker attains an initial foothold over the network, whether by a phishing attack or exploiting a publicly exposed vulnerability. Hackers may then seem to maintain access over the machine (Persistence), elevate their privileges, and laterally pivot between network devices (Lateral Movement). Last, the hacker tries to complete their objective, for example, a denial of service of critical infrastructure, exfiltration of sensitive information, or distraction of existing services. This event is known as Attack Path. An attack path contains one or more Attack Techniques, allowing the hacker to accomplish his objective.

Search

IDNamePlatformFamilyFramework
T1047Windows Management InstrumentationExecutionMITRE ATT&CK
T1048.003Exfiltration Over Symmetric Encrypted Non-C2 ProtocolExfiltrationMITRE ATT&CK
T1059.005Windows Command ShellExecutionMITRE ATT&CK
T1078.002Domain AccountsDefense Evasion, Persistence, Privilege Escalation, Initial AccessMITRE ATT&CK
T1087.004Cloud AccountDiscoveryMITRE ATT&CK
T1207Rogue Domain ControllerDefense EvasionMITRE ATT&CK
T1211Exploitation for Defense EvasionDefense EvasionMITRE ATT&CK
T1218.007MsiexecDefense EvasionMITRE ATT&CK
T1219Remote Access SoftwareCommand and ControlMITRE ATT&CK
T1484.001Group Policy ModificationDefense Evasion, Privilege EscalationMITRE ATT&CK
T1547.005Security Support ProviderPersistence, Privilege EscalationMITRE ATT&CK
T1550.003Pass the TicketDefense Evasion, Lateral MovementMITRE ATT&CK
T1552.002Credentials in RegistryCredential AccessMITRE ATT&CK
T1556.007Hybrid IdentityCredential Access, Defense Evasion, PersistenceMITRE ATT&CK
T1574.009Path Interception by Unquoted PathPersistence, Privilege Escalation, Defense EvasionMITRE ATT&CK
T1574.010Services File Permissions WeaknessPersistence, Privilege Escalation, Defense EvasionMITRE ATT&CK
T1580Cloud Infrastructure DiscoveryDiscoveryMITRE ATT&CK
T1595.001Scanning IP BlocksReconnaissanceMITRE ATT&CK
T1615Group Policy DiscoveryDiscoveryMITRE ATT&CK
WAS.113317Expression Language InjectionInjectionOWASP
WAS.98116NoSQL InjectionInjectionOWASP
WAS.98120Code InjectionInjectionOWASP