As part of a typical attack, adversaries leverage different tools and techniques to accomplish their objectives. Usually, a hacker attains an initial foothold over the network, whether by a phishing attack or exploiting a publicly exposed vulnerability. Hackers may then seem to maintain access over the machine (Persistence), elevate their privileges, and laterally pivot between network devices (Lateral Movement). Last, the hacker tries to complete their objective, for example, a denial of service of critical infrastructure, exfiltration of sensitive information, or distraction of existing services. This event is known as Attack Path. An attack path contains one or more Attack Techniques, allowing the hacker to accomplish his objective.
ID | Name | Platform | Family | Framework |
---|---|---|---|---|
T1047 | Windows Management Instrumentation | Execution | MITRE ATT&CK | |
T1048.003 | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Exfiltration | MITRE ATT&CK | |
T1059.005 | Windows Command Shell | Execution | MITRE ATT&CK | |
T1078.002 | Domain Accounts | Defense Evasion, Persistence, Privilege Escalation, Initial Access | MITRE ATT&CK | |
T1087.004 | Cloud Account | Discovery | MITRE ATT&CK | |
T1207 | Rogue Domain Controller | Defense Evasion | MITRE ATT&CK | |
T1211 | Exploitation for Defense Evasion | Defense Evasion | MITRE ATT&CK | |
T1218.007 | Msiexec | Defense Evasion | MITRE ATT&CK | |
T1219 | Remote Access Software | Command and Control | MITRE ATT&CK | |
T1484.001 | Group Policy Modification | Defense Evasion, Privilege Escalation | MITRE ATT&CK | |
T1547.005 | Security Support Provider | Persistence, Privilege Escalation | MITRE ATT&CK | |
T1550.003 | Pass the Ticket | Defense Evasion, Lateral Movement | MITRE ATT&CK | |
T1552.002 | Credentials in Registry | Credential Access | MITRE ATT&CK | |
T1556.007 | Hybrid Identity | Credential Access, Defense Evasion, Persistence | MITRE ATT&CK | |
T1574.009 | Path Interception by Unquoted Path | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK | |
T1574.010 | Services File Permissions Weakness | Persistence, Privilege Escalation, Defense Evasion | MITRE ATT&CK | |
T1580 | Cloud Infrastructure Discovery | Discovery | MITRE ATT&CK | |
T1595.001 | Scanning IP Blocks | Reconnaissance | MITRE ATT&CK | |
T1615 | Group Policy Discovery | Discovery | MITRE ATT&CK | |
WAS.113317 | Expression Language Injection | Injection | OWASP | |
WAS.98116 | NoSQL Injection | Injection | OWASP | |
WAS.98120 | Code Injection | Injection | OWASP |