
Techniques - Enterprise | MITRE ATT&CK®
Techniques represent 'how' an adversary achieves a tactical goal by performing an action. For example, an adversary may dump credentials to achieve credential access.
MITRE ATT&CK®
MITRE ATT&CK ® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for …
Enterprise tactics - MITRE ATT&CK®
Enterprise tactics Tactics represent the "why" of an ATT&CK technique or sub-technique. It is the adversary's tactical goal: the reason for performing an action. For example, an adversary may …
Phishing, Technique T1566 - Enterprise | MITRE ATT&CK®
Phishing may also involve social engineering techniques, such as posing as a trusted source, as well as evasive techniques such as removing or manipulating emails or metadata/headers …
Initial Access, Tactic TA0001 - Enterprise | MITRE ATT&CK®
Oct 17, 2018 · Initial Access consists of techniques that use various entry vectors to gain their initial foothold within a network. Techniques used to gain a foothold include targeted …
Enterprise Matrix - MITRE ATT&CK®
Below are the tactics and techniques representing the MITRE ATT&CK ® Matrix for Enterprise. The Matrix contains information for the following platforms: Windows, macOS, Linux, PRE, …
Defense Evasion, Tactic TA0005 - Enterprise | MITRE ATT&CK®
Oct 17, 2018 · Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse …
Get Started | MITRE ATT&CK®
ATT&CK is knowledge base of adversarial techniques based on real-world observations. ATT&CK focuses on how adversaries interact with systems during an operation, reflecting the various …
Techniques - ICS | MITRE ATT&CK®
Techniques represent 'how' an adversary achieves a tactical goal by performing an action. For example, an adversary may dump credentials to achieve credential access.
Valid Accounts, Technique T1078 - Enterprise | MITRE ATT&CK®
Oct 24, 2018 · Sub-techniques (4) Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense …