Uploaded by Dumisani Nxumalo

ATTACK MATRIX

advertisement
Ini�al Access
Execu�on
Persistence
Privilege Escala�on
Defense Evasion
Creden�al Access
Discovery
Lateral Movement
Collec�on
Command and Control
Exfiltra�on
Impact
Drive-by Compromise
AppleScript
.bash_profile and .bashrc
Access Token Manipula�on
Access Token Manipula�on
Account Manipula�on
Account Discovery
AppleScript
Audio Capture
Commonly Used Port
Automated Exfiltra�on
Account Access Removal
Exploit Public-Facing Applica�on
CMSTP
Accessibility Features
Accessibility Features
Binary Padding
Bash History
Data Destruc�on
Account Manipula�on
AppCert DLLs
BITS Jobs
Brute Force
Communica�on Through
Removable Media
Data Compressed
Command-Line Interface
Applica�on
Deployment So�ware
Automated Collec�on
External Remote Services
Applica�on Window
Discovery
Data Encrypted for Impact
Compiled HTML File
AppCert DLLs
AppInit DLLs
Bypass User Account Control
Creden�al Dumping
Data Transfer Size Limits
Defacement
Replica�on Through
Removable Media
Component Object Model and
Distributed COM
AppInit DLLs
Applica�on Shimming
Clear Command History
Bypass User Account Control
CMSTP
Domain Trust Discovery
Exploita�on of Remote
Services
Exfiltra�on Over
Alterna�ve Protocol
Disk Content Wipe
Applica�on Shimming
Creden�als from
Web Browsers
Component Object Model
and Distributed COM
Data Encrypted
Hardware Addi�ons
Browser Bookmark
Discovery
Authen�ca�on Package
DLL Search Order Hijacking
Code Signing
BITS Jobs
Dylib Hijacking
Compile A�er Delivery
Bootkit
Elevated Execu�on with Prompt
Compiled HTML File
Browser Extensions
Emond
Component Firmware
Change Default File Associa�on
Exploita�on for Privilege
Escala�on
Component Object
Model Hijacking
Extra Window Memory
Injec�on
Connec�on Proxy
Spearphishing A�achment
Control Panel Items
Spearphishing Link
Dynamic Data Exchange
Spearphishing via Service
Execu�on through API
Supply Chain Compromise
Execu�on through
Module Load
Trusted Rela�onship
Valid Accounts
Exploita�on for
Client Execu�on
Graphical User Interface
InstallU�l
Launchctl
Local Job Scheduling
LSASS Driver
Mshta
PowerShell
Regsvcs/Regasm
Regsvr32
Rundll32
Scheduled Task
Scrip�ng
Component Firmware
Component Object Model
Hijacking
Create Account
DLL Search Order Hijacking
Dylib Hijacking
DCShadow
Deobfuscate/Decode Files
or Informa�on
Exploita�on for
Creden�al Access
Forced Authen�ca�on
Hooking
Input Capture
Input Prompt
Query Registry
File System Permissions
Weakness
New Service
DLL Side-Loading
Private Keys
Execu�on Guardrails
Securityd Memory
Exploita�on for
Defense Evasion
Steal Web Session Cookie
Hooking
Hypervisor
Signed Binary Proxy Execu�on
Kernel Modules and Extensions
Signed Script Proxy Execu�on
Launch Agent
Source
Launch Daemon
Space a�er Filename
Launchctl
Third-party So�ware
LC_LOAD_DYLIB Addi�on
Trap
Local Job Scheduling
Trusted Developer U�li�es
Login Item
User Execu�on
Logon Scripts
Windows Management
Instrumenta�on
LSASS Driver
Modify Exis�ng Service
Netsh Helper DLL
New Service
Office Applica�on Startup
Path Intercep�on
Plist Modifica�on
Port Knocking
Port Monitors
PowerShell Profile
Rc.common
Plist Modifica�on
Port Monitors
PowerShell Profile
Process Injec�on
Scheduled Task
Service Registry Permissions
Weakness
Setuid and Setgid
SID-History Injec�on
Startup Items
Sudo
Sudo Caching
Valid Accounts
Web Shell
Extra Window
Memory Injec�on
File and Directory
Permissions Modifica�on
File Dele�on
File System Logical Offsets
Gatekeeper Bypass
Group Policy Modifica�on
Hidden Files and Directories
Data from Network
Shared Drive
Custom Cryptographic
Protocol
Data Encoding
Pass the Hash
Data from
Removable Media
Data Obfusca�on
Pass the Ticket
Data Staged
Domain Fron�ng
Remote Desktop Protocol
Email Collec�on
Remote File Copy
Input Capture
Domain Genera�on
Algorithms
Remote Services
Man in the Browser
Replica�on Through
Removable Media
Screen Capture
Shared Webroot
Video Capture
Exfiltra�on Over
Other Network Medium
Exfiltra�on Over
Physical Medium
Scheduled Transfer
Fallback Channels
Taint Shared Content
Port Knocking
Security So�ware
Discovery
Third-party So�ware
Remote Access Tools
Windows Admin Shares
Remote File Copy
So�ware Discovery
Windows Remote
Management
Standard Applica�on
Layer Protocol
Firmware Corrup�on
Inhibit System Recovery
Network Denial of Service
Resource Hijacking
Run�me Data Manipula�on
Stored Data Manipula�on
Mul�band Communica�on
Mul�layer Encryp�on
Endpoint Denial of Service
System Shutdown/Reboot
Mul�-Stage Channels
Remote System
Discovery
Disk Structure Wipe
Service Stop
Mul�-hop Proxy
SSH Hijacking
System Informa�on
Discovery
Exfiltra�on Over Command
and Control Channel
Transmi�ed Data
Manipula�on
Standard Cryptographic Protocol
System Network
Configura�on Discovery
Standard Non-Applica�on
Layer Protocol
System Network
Connec�ons Discovery
Uncommonly Used Port
System Owner/User Discovery
Web Service
System Service Discovery
System Time Discovery
Virtualiza�on/Sandbox
Evasion
HISTCONTROL
Image File Execu�on Op�ons
Injec�on
Indicator Blocking
Indicator Removal from Tools
Indicator Removal on Host
Indirect Command Execu�on
Install Root Cer�ficate
InstallU�l
Launchctl
LC_MAIN Hijacking
Masquerading
Redundant Access
Mshta
Registry Run Keys /
Startup Folder
Network Share Connec�on
Removal
Scheduled Task
NTFS File A�ributes
Screensaver
Obfuscated Files or Informa�on
Security Support Provider
Parent PID Spoofing
Server So�ware
Component
Plist Modifica�on
Shortcut Modifica�on
Two-Factor Authen�ca�on
Intercep�on
Logon Scripts
Data from Local System
Custom Command
and Control Protocol
Hidden Window
Modify Registry
Setuid and Setgid
Network Sniffing
Internal Spearphishing
Data from Informa�on
Repositories
Connec�on Proxy
Hidden Users
Re-opened
Applica�ons
Service Registry
Permissions Weakness
Peripheral Device
Discovery
LLMNR/NBT-NS
Poisoning and Relay
Password Filter DLL
Path Intercep�on
Password Policy
Discovery
Process Discovery
DLL Search Order Hijacking
Hidden Files and Directories
Network Sniffing
Keychain
Launch Daemon
Parent PID Spoofing
Network Share Discovery
Kerberoas�ng
External Remote Services
Disabling Security Tools
Network Service Scanning
Permission Groups
Discovery
Emond
Service Execu�on
XSL Script Processing
Hooking
Control Panel Items
Creden�als in Registry
Image File Execu�on Op�ons
Injec�on
Image File Execu�on Op�ons
Injec�on
Windows Remote
Management
File System Permissions
Weakness
Creden�als in Files
File and Directory Discovery
Clipboard Data
MITRE ATT&CK
Enterprise Framework
®
Port Knocking
Process Doppelgänging
Process Hollowing
Process Injec�on
SIP and Trust
Provider Hijacking
Redundant Access
Startup Items
Regsvr32
System Firmware
Rootkit
Systemd Service
Rundll32
Time Providers
Scrip�ng
Trap
Signed Binary Proxy Execu�on
Valid Accounts
Signed Script Proxy Execu�on
Web Shell
Windows Management
Instrumenta�on Event
Subscrip�on
Winlogon Helper DLL
SIP and Trust Provider Hijacking
Regsvcs/Regasm
attack.mitre.org
So�ware Packing
Space a�er Filename
Template Injec�on
Timestomp
Trusted Developer U�li�es
Valid Accounts
Virtualiza�on/Sandbox Evasion
Web Service
SOLVING PROBLEMS
FOR A SAFER WORLD
XSL Script Processing
© 2020 MITRE Matrix current as of February 2020
Download