2023-04-11 00:47:38
Mitre Att&ck Matrix has defined nine techniques to cover Lateral Movement. Lateral Movement is tied three ways, in terms of being the second least complicated category.
Exploitation of Remote Services is when a t...
2023-04-08 02:05:52
The Mitre Att&ck Matrix has set 30 Techniques in the Discovery category. Discovery is Mitre Att&ck Matrix’s second most complex category. These are generally steps taken to enumerate the target the threat acto...
2023-04-04 01:06:21
The Mitre Att&ck Matrix has defined 17 sub-techniques to define the Credential Access Technique.
Adversary-in-the-Middle is when a threat actor intercepts traffic from a target to capture or manipulate before sen...
2023-04-01 21:28:43
The Mitre Att&ck Matrix’s most complex technique is Defense Evasion. Mitre has defined a whopping 42 sub-techniques to cover the Defense Evasion technique!
Abuse Elevation Control Mechanism is when a threat act...
2023-03-27 01:31:14
The Mitre Att&ck Matrix has defined 13 techniques for Privilege Escalation.
Abuse Elevation Control Mechanism is when a threat actor utilizes a flaw in a mechanic used to elevate privileges to grant privileges. E...
2023-03-26 00:53:20
The Mitre Att&ck Matrix has defined 19 techniques under the Persistence category.
Account Manipulation is when a threat actor modifies an existing account to maintain access. Be it from credentials to permissions...
2023-03-24 01:25:46
The Mitre Att&ck Matrix has defined 13 techniques in the Execution category of a Cyber Attack.
Command and Scripting Interpreter This is a script or program a threat actor executes on their target's host that can...
2023-03-23 00:12:34
The Mitre Att&ck Matrix has defined nine techniques to cover initial access activities in a cyber attack.
Drive-by-Compromise is when a threat actor compromises a website to inject malicious code that executes wh...
2023-03-22 00:34:52
To define Resource Development, the Mitre Att&ck Matrix has defined seven techniques to cover the Resource Development techniques used in a Cyber Attack.
Acquire Infrastructure. The Acquire Infrastructure techniq...
2023-03-21 00:25:59
The MITRE Att&ck Matrix has specified ten techniques to classify as reconnaissance.
Active-Scanning means the threat actor used a tool such as Nmap to scan the network.
Gather Victim Host Information would mea...