![]() ![]() Use Alternate Authentication Material: Application Access Token, System Network Configuration Discovery: Internet Connection Discovery, Supply Chain Compromise: Compromise Software Supply Chain, Steal or Forge Kerberos Tickets: Kerberoasting, Remote Services: Remote Desktop Protocol, Remote Services: SMB/Windows Admin Shares, Remote Services: Windows Remote Management, Permission Groups Discovery: Domain Groups, ![]() Masquerading: Masquerade Task or Service, Masquerading: Match Legitimate Name or Location, Impair Defenses: Disable or Modify System Firewall, Impair Defenses: Disable or Modify Tools, Impair Defenses: Disable Windows Event Logging, ![]() Gather Victim Identity Information: Credentials, Obfuscated Files or Information: Steganography,Īccount Manipulation: Additional Cloud Credentials,Īccount Manipulation: Additional Cloud Roles,Īccount Manipulation: Device Registration,Īccount Manipulation: Additional Email Delegate Permissions,Īpplication Layer Protocol: Web Protocols,Īrchive Collected Data: Archive via Utility,Ĭommand and Scripting Interpreter: PowerShell,Ĭommand and Scripting Interpreter: Visual Basic,Ĭommand and Scripting Interpreter: Windows Command Shell,Ĭredentials from Password Stores: Credentials from Web Browsers,ĭata from Information Repositories: Code Repositories,ĭomain Policy Modification: Domain Trust Modification,Įmail Collection: Remote Email Collection,Įxfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol, Live Version Associated Group Descriptions NameĮstablish Accounts: Social Media Accounts,Įvent Triggered Execution: Windows Management Instrumentation Event Subscription, ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |