Attack Path Techniques

As part of a typical attack, adversaries leverage different tools and techniques to accomplish their objectives. Usually, a hacker attains an initial foothold over the network, whether by a phishing attack or exploiting a publicly exposed vulnerability. Hackers may then seem to maintain access over the machine (Persistence), elevate their privileges, and laterally pivot between network devices (Lateral Movement). Last, the hacker tries to complete their objective, for example, a denial of service of critical infrastructure, exfiltration of sensitive information, or distraction of existing services. This event is known as Attack Path. An attack path contains one or more Attack Techniques, allowing the hacker to accomplish his objective.

Search

IDNamePlatformFamilyFramework
T1082System Information DiscoveryDiscoveryMITRE ATT&CK
T1083File and Directory DiscoveryDiscoveryMITRE ATT&CK
T1114.002Remote Email CollectionCollectionMITRE ATT&CK
T1134.005SID-History InjectionDefense Evasion, Privilege EscalationMITRE ATT&CK
T1207Rogue Domain ControllerDefense EvasionMITRE ATT&CK
T1211Exploitation for Defense EvasionDefense EvasionMITRE ATT&CK
T1219Remote Access SoftwareCommand and ControlMITRE ATT&CK
T1484.001Group Policy ModificationDefense Evasion, Privilege EscalationMITRE ATT&CK
T1484.002Trust ModificationDefense Evasion, Privilege EscalationMITRE ATT&CK
T1499.004Application or System ExploitationImpactMITRE ATT&CK
T1518.001Security Software DiscoveryDiscoveryMITRE ATT&CK
T1526Cloud Service DiscoveryDiscoveryMITRE ATT&CK
T1530Data from Cloud StorageCollectionMITRE ATT&CK
T1547.002Authentication PackagePersistence, Privilege EscalationMITRE ATT&CK
T1548.005Temporary Elevated Cloud AccessDefense Evasion, Privilege EscalationMITRE ATT&CK
T1550.001Application Access TokenLateral Movement, Defense EvasionMITRE ATT&CK
T1558.001Golden TicketCredential AccessMITRE ATT&CK
T1558.004AS-REP RoastingMITRE ATT&CK
T1574.009Path Interception by Unquoted PathPersistence, Privilege Escalation, Defense EvasionMITRE ATT&CK
T1574.011Services Registry Permissions WeaknessPersistence, Privilege Escalation, Defense EvasionMITRE ATT&CK
T1615Group Policy DiscoveryDiscoveryMITRE ATT&CK
WAS.113162MySQLjs SQL Injection Authentication BypassInjectionOWASP
WAS.98113XML External EntitySecurity MisconfigurationOWASP
WAS.98116NoSQL InjectionInjectionOWASP
WAS.98123Operating System Command InjectionInjectionOWASP
T1059.009Cloud APIExecutionMITRE ATT&CK
T1210Exploitation of Remote ServicesLateral MovementMITRE ATT&CK