Übersicht der SEO Analyse
Metaangaben
72% 
Seitenqualität
63% 
Seitenstruktur
79% 
Verlinkung
25% 
Server
54% 
Externe Faktoren
100% 
SEO Score
Antwortzeit
0,56 s
Dateigröße
1.458,50 kB
Wörter
4993
Medien
5
Anzahl Links
1819 Intern / 7 Extern

To-do Liste mit SEO Optimierungen

Meta-Angaben im HTML

Titel
(Extrem wichtig)
MITRE ATT&CK®
Der Titel ist zu kurz. (164 Pixel von maximal 580 Pixel Länge) Jetzt optimieren
Es gibt keine Wortwiederholungen im Titel.
Meta-Description
(Extrem wichtig)
Die Meta-Description fehlt.
Crawlbarkeit
(Extrem wichtig)
Es gibt keine Probleme beim Zugriff auf die Webseite.
Canonical Link
(Wichtig)
Es ist kein Canonical Link angegeben.
Sprache
(Wenig wichtig)
Im Text erkannte Sprache: en
Im HTML angegebene Sprache: en
Serverstandort: Vereinigte Staaten von Amerika
Die Sprache wird im HTML Code wie folgt angegeben: en
Alternate/Hreflang Links
(Wenig wichtig)
Die Seite nutzt keine Alternate Links.
Weitere Metatags
(Wenig wichtig)
Es gibt keinen rel next Meta Tag auf der Seite.
Es gibt keinen rel prev Meta Tag auf der Seite.
Domain
(Wenig wichtig)
Die Webseite befindet sich auf einer Subdomain. Für eine erfolgreiche Suchmaschinenoptimierung solltest Du eine eigene Domain verwenden.
Die Domain enthält keine Umlaute.
Seiten URL
(Wenig wichtig)
In der URL wurden keine Parameter entdeckt.
In der URL wurde keine Session ID entdeckt.
Die URL hat nicht zu viele Unterverzeichnisse.
Zeichensatzkodierung
(Wenig wichtig)
Die Angaben zur Zeichensatzkodierung (UTF-8) sind fehlerfrei.
Doctype
(Nice to have)
Die Doctype Angabe HTML 5 ist korrekt angegeben.
Die Doctype Angabe befindet sich an erster Stelle im HTML-Code.
Favicon
(Nice to have)
Das Favoriten Icon (Favicon) ist korrekt verlinkt.

Meta Tags

NameWert
google-site-verification2oJKLqNN62z6AOCb0A0IXGtbQuj-lev5YPAHFF_cbHQ
viewportwidth=device-width, initial-scale=1,shrink-to-fit=no
langen
X-UA-CompatibleIE=edge
charsetutf-8

Analysiere attack.mitre.org jetzt automatisch und vollständig mit allen Unterseiten!

Jetzt kostenlos testen
Garantiert keine Kosten während der Testphase.

Seitenqualität

Inhalt
(Extrem wichtig)
Der Seiteninhalt ist mit 4993 Wörtern sehr lang. Es macht eventuell Sinn den Text auf mehrere Seiten aufzuteilen.
Der Text besteht zu 5.6% aus Füllwörtern.
Im Text befindet sich eine Aufzählung, dies deutet auf eine gute Textstruktur hin.
Es wurden 4 Fließtextblöcke auf der Seite gefunden.
Es wurden keine Platzhalter Texte bzw. Bilder gefunden.
Es befinden sich keine Duplikate auf der Seite.
Die durchschnittliche Satzlänge ist mit 19.57 Wörtern gut.
Frames
(Extrem wichtig)
Die Seite hat kein Frameset.
Mobile
(Wenig wichtig)
Es ist kein Apple-Touch Icon angegeben.
Die Größe des HTML-Dokuments ist mit 1458.5 kB sehr groß.
Der angegebene Viewport (width=device-width, initial-scale=1,shrink-to-fit=no) ist korrekt.
Bold- und Strongtags
(Wenig wichtig)
Die Nutzung von Strong- und Bold-Tags ist optimal. Wir empfehlen für diese Webseite die Verwendung von bis zu 100 Tags.
Bilder Optimierung
(Wenig wichtig)
Bei 3 Bildern fehlt das Alt-Attribut. Der Inhalt von Alt-Attributen wird von Suchmaschinen auch als Text gewertet und ist wichtig für die Bildersuche.
Soziale Vernetzung
(Nice to have)
Es befinden sich wenige Social-Sharing Möglichkeiten auf der Seite. Mit Plugins zum Teilen kann die Reichweite der Seite in sozialen Netzwerken erhöht werden.
Zusätzliches Markup
(Nice to have)
Es wurde kein zusätzliches Markup gefunden.
HTTPS
(Wenig wichtig)
Die Seite verwendet HTTPS um Daten sicher zu übertragen.
Alle eingebundenen Dateien werden ebenfalls über HTTPS ausgeliefert.

Medienliste

URLALT-AttributeTitel
/theme/images/mitre_attack_logo.pngKein ALT-Attribut angegeben
/theme/images/external-site.svgExternal site
/theme/images/ATT&CK_red.pngKein ALT-Attribut angegeben
/theme/images/external-site-dark.jpegExternal site
/theme/images/mitrelogowhiteontrans.gifKein ALT-Attribut angegeben

Seitenstruktur

H1 Überschrift
(Extrem wichtig)
Es ist keine H1-Überschrift definiert.
Überschriften
(Wichtig)
Die Überschriftenstruktur ist fehlerhaft. Es sollte keine Hierarchie (H1-H6) ausgelassen werden.

Überschriftenstruktur

Überschriften HierarchieInhalt
H2 ATT&CK Matrix for Enterprise
Es befinden sich zu viele interne Links (1819) auf der Seite.
Einige der Linktexte wiederholen sich.
Keiner der Linktexte ist zu lang.
Alle internen Links haben keine dynamischen Parameter.
Es befinden sich 7 externe Links auf der Seite.
LinkAttributeLinktext
https://attack.mitre.org/Kein Text
/matrices/Matrices
/matrices/enterprise/Enterprise
/matrices/mobile/Mobile
/matrices/ics/ICS
https://attack.mitre.org/tactics/Tactics
/tactics/enterprise/Textduplikat Enterprise
/tactics/mobile/Textduplikat Mobile
/tactics/ics/Textduplikat ICS
/techniques/Techniques
/techniques/enterprise/Textduplikat Enterprise
/techniques/mobile/Textduplikat Mobile
/techniques/ics/Textduplikat ICS
/datasourcesDefenses
/datasourcesData Sources
/mitigations/Mitigations
/mitigations/enterprise/Textduplikat Enterprise
/mitigations/mobile/Textduplikat Mobile
/mitigations/ics/Textduplikat ICS
https://attack.mitre.org/assetsAssets
https://attack.mitre.org/groupsCTI
https://attack.mitre.org/groupsGroups
https://attack.mitre.org/softwareSoftware
/campaignsCampaigns
/resources/Resources
/resources/Get Started
/resources/learn-more-about-at...Learn More about ATT&CK
/resources/attackcon/ATT&CKcon
/resources/attack-data-and-tools/ATT&CK Data & Tools
/resources/faq/FAQ
/resources/engage-with-attack/...Engage with ATT&CK
/resources/versions/Version History
/resources/updates/Updates
/resources/legal-and-branding/Legal & Branding
/resources/engage-with-attack/...Benefactors
https://medium.com/mitre-attack/Neues Fenster Extern Blog
IMG-ALT External site
https://na.eventscloud.com/att...Extern Subdomain ATT&CKcon 6.0
https://www.openconf.org/ATTAC...Extern Subdomain our CFP
/resources/Textduplikat Get Started
/resources/engage-with-attack/...Contribute
https://medium.com/mitre-attackNeues Fenster Extern Textduplikat Blog
IMG-ALT External site
/resources/faqTextduplikat FAQ
/tactics/TA0043Reconnaissance
A-TITLE TA0043
/tactics/TA0042Resource Development
A-TITLE TA0042
/tactics/TA0001Initial Access
A-TITLE TA0001
/tactics/TA0002Execution
A-TITLE TA0002
/tactics/TA0003Persistence
A-TITLE TA0003
/tactics/TA0004Privilege Escalation
A-TITLE TA0004
/tactics/TA0005Defense Evasion
A-TITLE TA0005
/tactics/TA0006Credential Access
A-TITLE TA0006
/tactics/TA0007Discovery
A-TITLE TA0007
/tactics/TA0008Lateral Movement
A-TITLE TA0008
/tactics/TA0009Collection
A-TITLE TA0009
/tactics/TA0011Command and Control
A-TITLE TA0011
/tactics/TA0010Exfiltration
A-TITLE TA0010
/tactics/TA0040Impact
A-TITLE TA0040
/techniques/T1595Active Scanning (3)
A-TITLE T1595
/techniques/T1595/001Scanning IP Blocks
A-TITLE T1595.001
/techniques/T1595/002Vulnerability Scanning
A-TITLE T1595.002
/techniques/T1595/003Wordlist Scanning
A-TITLE T1595.003
/techniques/T1592Gather Victim Host Information (4)
A-TITLE T1592
/techniques/T1592/001Hardware
A-TITLE T1592.001
/techniques/T1592/002Textduplikat Software
A-TITLE T1592.002
/techniques/T1592/003Firmware
A-TITLE T1592.003
/techniques/T1592/004Client Configurations
A-TITLE T1592.004
/techniques/T1589Gather Victim Identity Information (3)
A-TITLE T1589
/techniques/T1589/001Credentials
A-TITLE T1589.001
/techniques/T1589/002Email Addresses
A-TITLE T1589.002
/techniques/T1589/003Employee Names
A-TITLE T1589.003
/techniques/T1590Gather Victim Network Information (6)
A-TITLE T1590
/techniques/T1590/001Domain Properties
A-TITLE T1590.001
/techniques/T1590/002DNS
A-TITLE T1590.002
/techniques/T1590/003Network Trust Dependencies
A-TITLE T1590.003
/techniques/T1590/004Network Topology
A-TITLE T1590.004
/techniques/T1590/005IP Addresses
A-TITLE T1590.005
/techniques/T1590/006Network Security Appliances
A-TITLE T1590.006
/techniques/T1591Gather Victim Org Information (4)
A-TITLE T1591
/techniques/T1591/001Determine Physical Locations
A-TITLE T1591.001
/techniques/T1591/002Business Relationships
A-TITLE T1591.002
/techniques/T1591/003Identify Business Tempo
A-TITLE T1591.003
/techniques/T1591/004Identify Roles
A-TITLE T1591.004
/techniques/T1598Phishing for Information (4)
A-TITLE T1598
/techniques/T1598/001Spearphishing Service
A-TITLE T1598.001
/techniques/T1598/002Spearphishing Attachment
A-TITLE T1598.002
/techniques/T1598/003Spearphishing Link
A-TITLE T1598.003
/techniques/T1598/004Spearphishing Voice
A-TITLE T1598.004
/techniques/T1597Search Closed Sources (2)
A-TITLE T1597
/techniques/T1597/001Threat Intel Vendors
A-TITLE T1597.001
/techniques/T1597/002Purchase Technical Data
A-TITLE T1597.002
/techniques/T1596Search Open Technical Databases (5)
A-TITLE T1596
/techniques/T1596/001DNS/Passive DNS
A-TITLE T1596.001
/techniques/T1596/002WHOIS
A-TITLE T1596.002
/techniques/T1596/003Digital Certificates
A-TITLE T1596.003
/techniques/T1596/004CDNs
A-TITLE T1596.004
/techniques/T1596/005Scan Databases
A-TITLE T1596.005
/techniques/T1593Search Open Websites/Domains (3)
A-TITLE T1593
/techniques/T1593/001Social Media
A-TITLE T1593.001
/techniques/T1593/002Search Engines
A-TITLE T1593.002
/techniques/T1593/003Code Repositories
A-TITLE T1593.003
/techniques/T1594Search Victim-Owned Websites
A-TITLE T1594
/techniques/T1650Acquire Access
A-TITLE T1650
/techniques/T1583Acquire Infrastructure (8)
A-TITLE T1583
/techniques/T1583/001Domains
A-TITLE T1583.001
/techniques/T1583/002DNS Server
A-TITLE T1583.002
/techniques/T1583/003Virtual Private Server
A-TITLE T1583.003
/techniques/T1583/004Server
A-TITLE T1583.004
/techniques/T1583/005Botnet
A-TITLE T1583.005
/techniques/T1583/006Web Services
A-TITLE T1583.006
/techniques/T1583/007Serverless
A-TITLE T1583.007
/techniques/T1583/008Malvertising
A-TITLE T1583.008
/techniques/T1586Compromise Accounts (3)
A-TITLE T1586
/techniques/T1586/001Social Media Accounts
A-TITLE T1586.001
/techniques/T1586/002Email Accounts
A-TITLE T1586.002
/techniques/T1586/003Cloud Accounts
A-TITLE T1586.003
/techniques/T1584Compromise Infrastructure (8)
A-TITLE T1584
/techniques/T1584/001Textduplikat Domains
A-TITLE T1584.001
/techniques/T1584/002Textduplikat DNS Server
A-TITLE T1584.002
/techniques/T1584/003Textduplikat Virtual Private Server
A-TITLE T1584.003
/techniques/T1584/004Textduplikat Server
A-TITLE T1584.004
/techniques/T1584/005Textduplikat Botnet
A-TITLE T1584.005
/techniques/T1584/006Textduplikat Web Services
A-TITLE T1584.006
/techniques/T1584/007Textduplikat Serverless
A-TITLE T1584.007
/techniques/T1584/008Network Devices
A-TITLE T1584.008
/techniques/T1587Develop Capabilities (4)
A-TITLE T1587
/techniques/T1587/001Malware
A-TITLE T1587.001
/techniques/T1587/002Code Signing Certificates
A-TITLE T1587.002
/techniques/T1587/003Textduplikat Digital Certificates
A-TITLE T1587.003
/techniques/T1587/004Exploits
A-TITLE T1587.004
/techniques/T1585Establish Accounts (3)
A-TITLE T1585
/techniques/T1585/001Textduplikat Social Media Accounts
A-TITLE T1585.001
/techniques/T1585/002Textduplikat Email Accounts
A-TITLE T1585.002
/techniques/T1585/003Textduplikat Cloud Accounts
A-TITLE T1585.003
/techniques/T1588Obtain Capabilities (7)
A-TITLE T1588
/techniques/T1588/001Textduplikat Malware
A-TITLE T1588.001
/techniques/T1588/002Tool
A-TITLE T1588.002
/techniques/T1588/003Textduplikat Code Signing Certificates
A-TITLE T1588.003
/techniques/T1588/004Textduplikat Digital Certificates
A-TITLE T1588.004
/techniques/T1588/005Textduplikat Exploits
A-TITLE T1588.005
/techniques/T1588/006Vulnerabilities
A-TITLE T1588.006
/techniques/T1588/007Artificial Intelligence
A-TITLE T1588.007
/techniques/T1608Stage Capabilities (6)
A-TITLE T1608
/techniques/T1608/001Upload Malware
A-TITLE T1608.001
/techniques/T1608/002Upload Tool
A-TITLE T1608.002
/techniques/T1608/003Install Digital Certificate
A-TITLE T1608.003
/techniques/T1608/004Drive-by Target
A-TITLE T1608.004
/techniques/T1608/005Link Target
A-TITLE T1608.005
/techniques/T1608/006SEO Poisoning
A-TITLE T1608.006
/techniques/T1659Content Injection
A-TITLE T1659
/techniques/T1189Drive-by Compromise
A-TITLE T1189
/techniques/T1190Exploit Public-Facing Application
A-TITLE T1190
/techniques/T1133External Remote Services
A-TITLE T1133
/techniques/T1200Hardware Additions
A-TITLE T1200
/techniques/T1566Phishing (4)
A-TITLE T1566
/techniques/T1566/001Textduplikat Spearphishing Attachment
A-TITLE T1566.001
/techniques/T1566/002Textduplikat Spearphishing Link
A-TITLE T1566.002
/techniques/T1566/003Spearphishing via Service
A-TITLE T1566.003
/techniques/T1566/004Textduplikat Spearphishing Voice
A-TITLE T1566.004
/techniques/T1091Replication Through Removable Media
A-TITLE T1091
/techniques/T1195Supply Chain Compromise (3)
A-TITLE T1195
/techniques/T1195/001Compromise Software Dependencies and Development Tools
A-TITLE T1195.001
/techniques/T1195/002Compromise Software Supply Chain
A-TITLE T1195.002
/techniques/T1195/003Compromise Hardware Supply Chain
A-TITLE T1195.003
/techniques/T1199Trusted Relationship
A-TITLE T1199
/techniques/T1078Valid Accounts (4)
A-TITLE T1078
/techniques/T1078/001Default Accounts
A-TITLE T1078.001
/techniques/T1078/002Domain Accounts
A-TITLE T1078.002
/techniques/T1078/003Local Accounts
A-TITLE T1078.003
/techniques/T1078/004Textduplikat Cloud Accounts
A-TITLE T1078.004
/techniques/T1669Wi-Fi Networks
A-TITLE T1669
/techniques/T1651Cloud Administration Command
A-TITLE T1651
/techniques/T1059Command and Scripting Interpreter (12)
A-TITLE T1059
/techniques/T1059/001PowerShell
A-TITLE T1059.001
/techniques/T1059/002AppleScript
A-TITLE T1059.002
/techniques/T1059/003Windows Command Shell
A-TITLE T1059.003
/techniques/T1059/004Unix Shell
A-TITLE T1059.004
/techniques/T1059/005Visual Basic
A-TITLE T1059.005
/techniques/T1059/006Python
A-TITLE T1059.006
/techniques/T1059/007JavaScript
A-TITLE T1059.007
/techniques/T1059/008Network Device CLI
A-TITLE T1059.008
/techniques/T1059/009Cloud API
A-TITLE T1059.009
/techniques/T1059/010AutoHotKey & AutoIT
A-TITLE T1059.010
/techniques/T1059/011Lua
A-TITLE T1059.011
/techniques/T1059/012Hypervisor CLI
A-TITLE T1059.012
/techniques/T1609Container Administration Command
A-TITLE T1609
/techniques/T1610Deploy Container
A-TITLE T1610
/techniques/T1675ESXi Administration Command
A-TITLE T1675
/techniques/T1203Exploitation for Client Execution
A-TITLE T1203
/techniques/T1674Input Injection
A-TITLE T1674
/techniques/T1559Inter-Process Communication (3)
A-TITLE T1559
/techniques/T1559/001Component Object Model
A-TITLE T1559.001
/techniques/T1559/002Dynamic Data Exchange
A-TITLE T1559.002
/techniques/T1559/003XPC Services
A-TITLE T1559.003
/techniques/T1106Native API
A-TITLE T1106
/techniques/T1053Scheduled Task/Job (5)
A-TITLE T1053
/techniques/T1053/002At
A-TITLE T1053.002
/techniques/T1053/003Cron
A-TITLE T1053.003
/techniques/T1053/005Scheduled Task
A-TITLE T1053.005
/techniques/T1053/006Systemd Timers
A-TITLE T1053.006
/techniques/T1053/007Container Orchestration Job
A-TITLE T1053.007
/techniques/T1648Serverless Execution
A-TITLE T1648
/techniques/T1129Shared Modules
A-TITLE T1129
/techniques/T1072Software Deployment Tools
A-TITLE T1072
/techniques/T1569System Services (3)
A-TITLE T1569
/techniques/T1569/001Launchctl
A-TITLE T1569.001
/techniques/T1569/002Service Execution
A-TITLE T1569.002
/techniques/T1569/003Systemctl
A-TITLE T1569.003
/techniques/T1204User Execution (4)
A-TITLE T1204
/techniques/T1204/001Malicious Link
A-TITLE T1204.001
/techniques/T1204/002Malicious File
A-TITLE T1204.002
/techniques/T1204/003Malicious Image
A-TITLE T1204.003
/techniques/T1204/004Malicious Copy and Paste
A-TITLE T1204.004
/techniques/T1047Windows Management Instrumentation
A-TITLE T1047
/techniques/T1098Account Manipulation (7)
A-TITLE T1098
/techniques/T1098/001Additional Cloud Credentials
A-TITLE T1098.001
/techniques/T1098/002Additional Email Delegate Permissions
A-TITLE T1098.002
/techniques/T1098/003Additional Cloud Roles
A-TITLE T1098.003
/techniques/T1098/004SSH Authorized Keys
A-TITLE T1098.004
/techniques/T1098/005Device Registration
A-TITLE T1098.005
/techniques/T1098/006Additional Container Cluster Roles
A-TITLE T1098.006
/techniques/T1098/007Additional Local or Domain Groups
A-TITLE T1098.007
/techniques/T1197BITS Jobs
A-TITLE T1197
/techniques/T1547Boot or Logon Autostart Execution (14)
A-TITLE T1547
/techniques/T1547/001Registry Run Keys / Startup Folder
A-TITLE T1547.001
/techniques/T1547/002Authentication Package
A-TITLE T1547.002
/techniques/T1547/003Time Providers
A-TITLE T1547.003
/techniques/T1547/004Winlogon Helper DLL
A-TITLE T1547.004
/techniques/T1547/005Security Support Provider
A-TITLE T1547.005
/techniques/T1547/006Kernel Modules and Extensions
A-TITLE T1547.006
/techniques/T1547/007Re-opened Applications
A-TITLE T1547.007
/techniques/T1547/008LSASS Driver
A-TITLE T1547.008
/techniques/T1547/009Shortcut Modification
A-TITLE T1547.009
/techniques/T1547/010Port Monitors
A-TITLE T1547.010
/techniques/T1547/012Print Processors
A-TITLE T1547.012
/techniques/T1547/013XDG Autostart Entries
A-TITLE T1547.013
/techniques/T1547/014Active Setup
A-TITLE T1547.014
/techniques/T1547/015Login Items
A-TITLE T1547.015
/techniques/T1037Boot or Logon Initialization Scripts (5)
A-TITLE T1037
/techniques/T1037/001Logon Script (Windows)
A-TITLE T1037.001
/techniques/T1037/002Login Hook
A-TITLE T1037.002
/techniques/T1037/003Network Logon Script
A-TITLE T1037.003
/techniques/T1037/004RC Scripts
A-TITLE T1037.004
/techniques/T1037/005Startup Items
A-TITLE T1037.005
/techniques/T1671Cloud Application Integration
A-TITLE T1671
/techniques/T1554Compromise Host Software Binary
A-TITLE T1554
/techniques/T1136Create Account (3)
A-TITLE T1136
/techniques/T1136/001Local Account
A-TITLE T1136.001
/techniques/T1136/002Domain Account
A-TITLE T1136.002
/techniques/T1136/003Cloud Account
A-TITLE T1136.003
/techniques/T1543Create or Modify System Process (5)
A-TITLE T1543
/techniques/T1543/001Launch Agent
A-TITLE T1543.001
/techniques/T1543/002Systemd Service
A-TITLE T1543.002
/techniques/T1543/003Windows Service
A-TITLE T1543.003
/techniques/T1543/004Launch Daemon
A-TITLE T1543.004
/techniques/T1543/005Container Service
A-TITLE T1543.005
/techniques/T1546Event Triggered Execution (17)
A-TITLE T1546
/techniques/T1546/001Change Default File Association
A-TITLE T1546.001
/techniques/T1546/002Screensaver
A-TITLE T1546.002
/techniques/T1546/003Windows Management Instrumentation Event Subscription
A-TITLE T1546.003
/techniques/T1546/004Unix Shell Configuration Modification
A-TITLE T1546.004
/techniques/T1546/005Trap
A-TITLE T1546.005
/techniques/T1546/006LC_LOAD_DYLIB Addition
A-TITLE T1546.006
/techniques/T1546/007Netsh Helper DLL
A-TITLE T1546.007
/techniques/T1546/008Accessibility Features
A-TITLE T1546.008
/techniques/T1546/009AppCert DLLs
A-TITLE T1546.009
/techniques/T1546/010AppInit DLLs
A-TITLE T1546.010
/techniques/T1546/011Application Shimming
A-TITLE T1546.011
/techniques/T1546/012Image File Execution Options Injection
A-TITLE T1546.012
/techniques/T1546/013PowerShell Profile
A-TITLE T1546.013
/techniques/T1546/014Emond
A-TITLE T1546.014
/techniques/T1546/015Component Object Model Hijacking
A-TITLE T1546.015
/techniques/T1546/016Installer Packages
A-TITLE T1546.016
/techniques/T1546/017Udev Rules
A-TITLE T1546.017
/techniques/T1668Exclusive Control
A-TITLE T1668
/techniques/T1133Textduplikat External Remote Services
A-TITLE T1133
/techniques/T1574Hijack Execution Flow (12)
A-TITLE T1574
/techniques/T1574/001DLL
A-TITLE T1574.001
/techniques/T1574/004Dylib Hijacking
A-TITLE T1574.004
/techniques/T1574/005Executable Installer File Permissions Weakness
A-TITLE T1574.005
/techniques/T1574/006Dynamic Linker Hijacking
A-TITLE T1574.006
/techniques/T1574/007Path Interception by PATH Environment Variable
A-TITLE T1574.007
/techniques/T1574/008Path Interception by Search Order Hijacking
A-TITLE T1574.008
/techniques/T1574/009Path Interception by Unquoted Path
A-TITLE T1574.009
/techniques/T1574/010Services File Permissions Weakness
A-TITLE T1574.010
/techniques/T1574/011Services Registry Permissions Weakness
A-TITLE T1574.011
/techniques/T1574/012COR_PROFILER
A-TITLE T1574.012
/techniques/T1574/013KernelCallbackTable
A-TITLE T1574.013
/techniques/T1574/014AppDomainManager
A-TITLE T1574.014
/techniques/T1525Implant Internal Image
A-TITLE T1525
/techniques/T1556Modify Authentication Process (9)
A-TITLE T1556
/techniques/T1556/001Domain Controller Authentication
A-TITLE T1556.001
/techniques/T1556/002Password Filter DLL
A-TITLE T1556.002
/techniques/T1556/003Pluggable Authentication Modules
A-TITLE T1556.003
/techniques/T1556/004Network Device Authentication
A-TITLE T1556.004
/techniques/T1556/005Reversible Encryption
A-TITLE T1556.005
/techniques/T1556/006Multi-Factor Authentication
A-TITLE T1556.006
/techniques/T1556/007Hybrid Identity
A-TITLE T1556.007
/techniques/T1556/008Network Provider DLL
A-TITLE T1556.008
/techniques/T1556/009Conditional Access Policies
A-TITLE T1556.009
/techniques/T1112Modify Registry
A-TITLE T1112
/techniques/T1137Office Application Startup (6)
A-TITLE T1137
/techniques/T1137/001Office Template Macros
A-TITLE T1137.001
/techniques/T1137/002Office Test
A-TITLE T1137.002
/techniques/T1137/003Outlook Forms
A-TITLE T1137.003
/techniques/T1137/004Outlook Home Page
A-TITLE T1137.004
/techniques/T1137/005Outlook Rules
A-TITLE T1137.005
/techniques/T1137/006Add-ins
A-TITLE T1137.006
/techniques/T1653Power Settings
A-TITLE T1653
/techniques/T1542Pre-OS Boot (5)
A-TITLE T1542
/techniques/T1542/001System Firmware
A-TITLE T1542.001
/techniques/T1542/002Component Firmware
A-TITLE T1542.002
/techniques/T1542/003Bootkit
A-TITLE T1542.003
/techniques/T1542/004ROMMONkit
A-TITLE T1542.004
/techniques/T1542/005TFTP Boot
A-TITLE T1542.005
/techniques/T1053Textduplikat Scheduled Task/Job (5)
A-TITLE T1053
/techniques/T1053/002Textduplikat At
A-TITLE T1053.002
/techniques/T1053/003Textduplikat Cron
A-TITLE T1053.003
/techniques/T1053/005Textduplikat Scheduled Task
A-TITLE T1053.005
/techniques/T1053/006Textduplikat Systemd Timers
A-TITLE T1053.006
/techniques/T1053/007Textduplikat Container Orchestration Job
A-TITLE T1053.007
/techniques/T1505Server Software Component (6)
A-TITLE T1505
/techniques/T1505/001SQL Stored Procedures
A-TITLE T1505.001
/techniques/T1505/002Transport Agent
A-TITLE T1505.002
/techniques/T1505/003Web Shell
A-TITLE T1505.003
/techniques/T1505/004IIS Components
A-TITLE T1505.004
/techniques/T1505/005Terminal Services DLL
A-TITLE T1505.005
/techniques/T1505/006vSphere Installation Bundles
A-TITLE T1505.006
/techniques/T1176Software Extensions (2)
A-TITLE T1176
/techniques/T1176/001Browser Extensions
A-TITLE T1176.001
/techniques/T1176/002IDE Extensions
A-TITLE T1176.002
/techniques/T1205Traffic Signaling (2)
A-TITLE T1205
/techniques/T1205/001Port Knocking
A-TITLE T1205.001
/techniques/T1205/002Socket Filters
A-TITLE T1205.002
/techniques/T1078Textduplikat Valid Accounts (4)
A-TITLE T1078
/techniques/T1078/001Textduplikat Default Accounts
A-TITLE T1078.001
/techniques/T1078/002Textduplikat Domain Accounts
A-TITLE T1078.002
/techniques/T1078/003Textduplikat Local Accounts
A-TITLE T1078.003
/techniques/T1078/004Textduplikat Cloud Accounts
A-TITLE T1078.004
/techniques/T1548Abuse Elevation Control Mechanism (6)
A-TITLE T1548
/techniques/T1548/001Setuid and Setgid
A-TITLE T1548.001
/techniques/T1548/002Bypass User Account Control
A-TITLE T1548.002
/techniques/T1548/003Sudo and Sudo Caching
A-TITLE T1548.003
/techniques/T1548/004Elevated Execution with Prompt
A-TITLE T1548.004
/techniques/T1548/005Temporary Elevated Cloud Access
A-TITLE T1548.005
/techniques/T1548/006TCC Manipulation
A-TITLE T1548.006
/techniques/T1134Access Token Manipulation (5)
A-TITLE T1134
/techniques/T1134/001Token Impersonation/Theft
A-TITLE T1134.001
/techniques/T1134/002Create Process with Token
A-TITLE T1134.002
/techniques/T1134/003Make and Impersonate Token
A-TITLE T1134.003
/techniques/T1134/004Parent PID Spoofing
A-TITLE T1134.004
/techniques/T1134/005SID-History Injection
A-TITLE T1134.005
/techniques/T1098Textduplikat Account Manipulation (7)
A-TITLE T1098
/techniques/T1098/001Textduplikat Additional Cloud Credentials
A-TITLE T1098.001
/techniques/T1098/002Textduplikat Additional Email Delegate Permissions
A-TITLE T1098.002
/techniques/T1098/003Textduplikat Additional Cloud Roles
A-TITLE T1098.003
/techniques/T1098/004Textduplikat SSH Authorized Keys
A-TITLE T1098.004
/techniques/T1098/005Textduplikat Device Registration
A-TITLE T1098.005
/techniques/T1098/006Textduplikat Additional Container Cluster Roles
A-TITLE T1098.006
/techniques/T1098/007Textduplikat Additional Local or Domain Groups
A-TITLE T1098.007
/techniques/T1547Textduplikat Boot or Logon Autostart Execution (14)
A-TITLE T1547
/techniques/T1547/001Textduplikat Registry Run Keys / Startup Folder
A-TITLE T1547.001
/techniques/T1547/002Textduplikat Authentication Package
A-TITLE T1547.002
/techniques/T1547/003Textduplikat Time Providers
A-TITLE T1547.003
/techniques/T1547/004Textduplikat Winlogon Helper DLL
A-TITLE T1547.004
/techniques/T1547/005Textduplikat Security Support Provider
A-TITLE T1547.005
/techniques/T1547/006Textduplikat Kernel Modules and Extensions
A-TITLE T1547.006
/techniques/T1547/007Textduplikat Re-opened Applications
A-TITLE T1547.007
/techniques/T1547/008Textduplikat LSASS Driver
A-TITLE T1547.008
/techniques/T1547/009Textduplikat Shortcut Modification
A-TITLE T1547.009
/techniques/T1547/010Textduplikat Port Monitors
A-TITLE T1547.010
/techniques/T1547/012Textduplikat Print Processors
A-TITLE T1547.012
/techniques/T1547/013Textduplikat XDG Autostart Entries
A-TITLE T1547.013
/techniques/T1547/014Textduplikat Active Setup
A-TITLE T1547.014
/techniques/T1547/015Textduplikat Login Items
A-TITLE T1547.015
/techniques/T1037Textduplikat Boot or Logon Initialization Scripts (5)
A-TITLE T1037
/techniques/T1037/001Textduplikat Logon Script (Windows)
A-TITLE T1037.001
/techniques/T1037/002Textduplikat Login Hook
A-TITLE T1037.002
/techniques/T1037/003Textduplikat Network Logon Script
A-TITLE T1037.003
/techniques/T1037/004Textduplikat RC Scripts
A-TITLE T1037.004
/techniques/T1037/005Textduplikat Startup Items
A-TITLE T1037.005
/techniques/T1543Textduplikat Create or Modify System Process (5)
A-TITLE T1543
/techniques/T1543/001Textduplikat Launch Agent
A-TITLE T1543.001
/techniques/T1543/002Textduplikat Systemd Service
A-TITLE T1543.002
/techniques/T1543/003Textduplikat Windows Service
A-TITLE T1543.003
/techniques/T1543/004Textduplikat Launch Daemon
A-TITLE T1543.004
/techniques/T1543/005Textduplikat Container Service
A-TITLE T1543.005
/techniques/T1484Domain or Tenant Policy Modification (2)
A-TITLE T1484
/techniques/T1484/001Group Policy Modification
A-TITLE T1484.001
/techniques/T1484/002Trust Modification
A-TITLE T1484.002
/techniques/T1611Escape to Host
A-TITLE T1611
/techniques/T1546Textduplikat Event Triggered Execution (17)
A-TITLE T1546
/techniques/T1546/001Textduplikat Change Default File Association
A-TITLE T1546.001
/techniques/T1546/002Textduplikat Screensaver
A-TITLE T1546.002
/techniques/T1546/003Textduplikat Windows Management Instrumentation Event Subscription
A-TITLE T1546.003
/techniques/T1546/004Textduplikat Unix Shell Configuration Modification
A-TITLE T1546.004
/techniques/T1546/005Textduplikat Trap
A-TITLE T1546.005
/techniques/T1546/006Textduplikat LC_LOAD_DYLIB Addition
A-TITLE T1546.006
/techniques/T1546/007Textduplikat Netsh Helper DLL
A-TITLE T1546.007
/techniques/T1546/008Textduplikat Accessibility Features
A-TITLE T1546.008
/techniques/T1546/009Textduplikat AppCert DLLs
A-TITLE T1546.009
/techniques/T1546/010Textduplikat AppInit DLLs
A-TITLE T1546.010
/techniques/T1546/011Textduplikat Application Shimming
A-TITLE T1546.011
/techniques/T1546/012Textduplikat Image File Execution Options Injection
A-TITLE T1546.012
/techniques/T1546/013Textduplikat PowerShell Profile
A-TITLE T1546.013
/techniques/T1546/014Textduplikat Emond
A-TITLE T1546.014
/techniques/T1546/015Textduplikat Component Object Model Hijacking
A-TITLE T1546.015
/techniques/T1546/016Textduplikat Installer Packages
A-TITLE T1546.016
/techniques/T1546/017Textduplikat Udev Rules
A-TITLE T1546.017
/techniques/T1068Exploitation for Privilege Escalation
A-TITLE T1068
/techniques/T1574Textduplikat Hijack Execution Flow (12)
A-TITLE T1574
/techniques/T1574/001Textduplikat DLL
A-TITLE T1574.001
/techniques/T1574/004Textduplikat Dylib Hijacking
A-TITLE T1574.004
/techniques/T1574/005Textduplikat Executable Installer File Permissions Weakness
A-TITLE T1574.005
/techniques/T1574/006Textduplikat Dynamic Linker Hijacking
A-TITLE T1574.006
/techniques/T1574/007Textduplikat Path Interception by PATH Environment Variable
A-TITLE T1574.007
/techniques/T1574/008Textduplikat Path Interception by Search Order Hijacking
A-TITLE T1574.008
/techniques/T1574/009Textduplikat Path Interception by Unquoted Path
A-TITLE T1574.009
/techniques/T1574/010Textduplikat Services File Permissions Weakness
A-TITLE T1574.010
/techniques/T1574/011Textduplikat Services Registry Permissions Weakness
A-TITLE T1574.011
/techniques/T1574/012Textduplikat COR_PROFILER
A-TITLE T1574.012
/techniques/T1574/013Textduplikat KernelCallbackTable
A-TITLE T1574.013
/techniques/T1574/014Textduplikat AppDomainManager
A-TITLE T1574.014
/techniques/T1055Process Injection (12)
A-TITLE T1055
/techniques/T1055/001Dynamic-link Library Injection
A-TITLE T1055.001
/techniques/T1055/002Portable Executable Injection
A-TITLE T1055.002
/techniques/T1055/003Thread Execution Hijacking
A-TITLE T1055.003
/techniques/T1055/004Asynchronous Procedure Call
A-TITLE T1055.004
/techniques/T1055/005Thread Local Storage
A-TITLE T1055.005
/techniques/T1055/008Ptrace System Calls
A-TITLE T1055.008
/techniques/T1055/009Proc Memory
A-TITLE T1055.009
/techniques/T1055/011Extra Window Memory Injection
A-TITLE T1055.011
/techniques/T1055/012Process Hollowing
A-TITLE T1055.012
/techniques/T1055/013Process Doppelg??nging
A-TITLE T1055.013
/techniques/T1055/014VDSO Hijacking
A-TITLE T1055.014
/techniques/T1055/015ListPlanting
A-TITLE T1055.015
/techniques/T1053Textduplikat Scheduled Task/Job (5)
A-TITLE T1053
/techniques/T1053/002Textduplikat At
A-TITLE T1053.002
/techniques/T1053/003Textduplikat Cron
A-TITLE T1053.003
/techniques/T1053/005Textduplikat Scheduled Task
A-TITLE T1053.005
/techniques/T1053/006Textduplikat Systemd Timers
A-TITLE T1053.006
/techniques/T1053/007Textduplikat Container Orchestration Job
A-TITLE T1053.007
/techniques/T1078Textduplikat Valid Accounts (4)
A-TITLE T1078
/techniques/T1078/001Textduplikat Default Accounts
A-TITLE T1078.001
/techniques/T1078/002Textduplikat Domain Accounts
A-TITLE T1078.002
/techniques/T1078/003Textduplikat Local Accounts
A-TITLE T1078.003
/techniques/T1078/004Textduplikat Cloud Accounts
A-TITLE T1078.004
/techniques/T1548Textduplikat Abuse Elevation Control Mechanism (6)
A-TITLE T1548
/techniques/T1548/001Textduplikat Setuid and Setgid
A-TITLE T1548.001
/techniques/T1548/002Textduplikat Bypass User Account Control
A-TITLE T1548.002
/techniques/T1548/003Textduplikat Sudo and Sudo Caching
A-TITLE T1548.003
/techniques/T1548/004Textduplikat Elevated Execution with Prompt
A-TITLE T1548.004
/techniques/T1548/005Textduplikat Temporary Elevated Cloud Access
A-TITLE T1548.005
/techniques/T1548/006Textduplikat TCC Manipulation
A-TITLE T1548.006
/techniques/T1134Textduplikat Access Token Manipulation (5)
A-TITLE T1134
/techniques/T1134/001Textduplikat Token Impersonation/Theft
A-TITLE T1134.001
/techniques/T1134/002Textduplikat Create Process with Token
A-TITLE T1134.002
/techniques/T1134/003Textduplikat Make and Impersonate Token
A-TITLE T1134.003
/techniques/T1134/004Textduplikat Parent PID Spoofing
A-TITLE T1134.004
/techniques/T1134/005Textduplikat SID-History Injection
A-TITLE T1134.005
/techniques/T1197Textduplikat BITS Jobs
A-TITLE T1197
/techniques/T1612Build Image on Host
A-TITLE T1612
/techniques/T1622Debugger Evasion
A-TITLE T1622
/techniques/T1140Deobfuscate/Decode Files or Information
A-TITLE T1140
/techniques/T1610Textduplikat Deploy Container
A-TITLE T1610
/techniques/T1006Direct Volume Access
A-TITLE T1006
/techniques/T1484Textduplikat Domain or Tenant Policy Modification (2)
A-TITLE T1484
/techniques/T1484/001Textduplikat Group Policy Modification
A-TITLE T1484.001
/techniques/T1484/002Textduplikat Trust Modification
A-TITLE T1484.002
/techniques/T1672Email Spoofing
A-TITLE T1672
/techniques/T1480Execution Guardrails (2)
A-TITLE T1480
/techniques/T1480/001Environmental Keying
A-TITLE T1480.001
/techniques/T1480/002Mutual Exclusion
A-TITLE T1480.002
/techniques/T1211Exploitation for Defense Evasion
A-TITLE T1211
/techniques/T1222File and Directory Permissions Modification (2)
A-TITLE T1222
/techniques/T1222/001Windows File and Directory Permissions Modification
A-TITLE T1222.001
/techniques/T1222/002Linux and Mac File and Directory Permissions Modification
A-TITLE T1222.002
/techniques/T1564Hide Artifacts (14)
A-TITLE T1564
/techniques/T1564/001Hidden Files and Directories
A-TITLE T1564.001
/techniques/T1564/002Hidden Users
A-TITLE T1564.002
/techniques/T1564/003Hidden Window
A-TITLE T1564.003
/techniques/T1564/004NTFS File Attributes
A-TITLE T1564.004
/techniques/T1564/005Hidden File System
A-TITLE T1564.005
/techniques/T1564/006Run Virtual Instance
A-TITLE T1564.006
/techniques/T1564/007VBA Stomping
A-TITLE T1564.007
/techniques/T1564/008Email Hiding Rules
A-TITLE T1564.008
/techniques/T1564/009Resource Forking
A-TITLE T1564.009
/techniques/T1564/010Process Argument Spoofing
A-TITLE T1564.010
/techniques/T1564/011Ignore Process Interrupts
A-TITLE T1564.011
/techniques/T1564/012File/Path Exclusions
A-TITLE T1564.012
/techniques/T1564/013Bind Mounts
A-TITLE T1564.013
/techniques/T1564/014Extended Attributes
A-TITLE T1564.014
/techniques/T1574Textduplikat Hijack Execution Flow (12)
A-TITLE T1574
/techniques/T1574/001Textduplikat DLL
A-TITLE T1574.001
/techniques/T1574/004Textduplikat Dylib Hijacking
A-TITLE T1574.004
/techniques/T1574/005Textduplikat Executable Installer File Permissions Weakness
A-TITLE T1574.005
/techniques/T1574/006Textduplikat Dynamic Linker Hijacking
A-TITLE T1574.006
/techniques/T1574/007Textduplikat Path Interception by PATH Environment Variable
A-TITLE T1574.007
/techniques/T1574/008Textduplikat Path Interception by Search Order Hijacking
A-TITLE T1574.008
/techniques/T1574/009Textduplikat Path Interception by Unquoted Path
A-TITLE T1574.009
/techniques/T1574/010Textduplikat Services File Permissions Weakness
A-TITLE T1574.010
/techniques/T1574/011Textduplikat Services Registry Permissions Weakness
A-TITLE T1574.011
/techniques/T1574/012Textduplikat COR_PROFILER
A-TITLE T1574.012
/techniques/T1574/013Textduplikat KernelCallbackTable
A-TITLE T1574.013
/techniques/T1574/014Textduplikat AppDomainManager
A-TITLE T1574.014
/techniques/T1562Impair Defenses (11)
A-TITLE T1562
/techniques/T1562/001Disable or Modify Tools
A-TITLE T1562.001
/techniques/T1562/002Disable Windows Event Logging
A-TITLE T1562.002
/techniques/T1562/003Impair Command History Logging
A-TITLE T1562.003
/techniques/T1562/004Disable or Modify System Firewall
A-TITLE T1562.004
/techniques/T1562/006Indicator Blocking
A-TITLE T1562.006
/techniques/T1562/007Disable or Modify Cloud Firewall
A-TITLE T1562.007
/techniques/T1562/008Disable or Modify Cloud Logs
A-TITLE T1562.008
/techniques/T1562/009Safe Mode Boot
A-TITLE T1562.009
/techniques/T1562/010Downgrade Attack
A-TITLE T1562.010
/techniques/T1562/011Spoof Security Alerting
A-TITLE T1562.011
/techniques/T1562/012Disable or Modify Linux Audit System
A-TITLE T1562.012
/techniques/T1656Impersonation
A-TITLE T1656
/techniques/T1070Indicator Removal (10)
A-TITLE T1070
/techniques/T1070/001Clear Windows Event Logs
A-TITLE T1070.001
/techniques/T1070/002Clear Linux or Mac System Logs
A-TITLE T1070.002
/techniques/T1070/003Clear Command History
A-TITLE T1070.003
/techniques/T1070/004File Deletion
A-TITLE T1070.004
/techniques/T1070/005Network Share Connection Removal
A-TITLE T1070.005
/techniques/T1070/006Timestomp
A-TITLE T1070.006
/techniques/T1070/007Clear Network Connection History and Configurations
A-TITLE T1070.007
/techniques/T1070/008Clear Mailbox Data
A-TITLE T1070.008
/techniques/T1070/009Clear Persistence
A-TITLE T1070.009
/techniques/T1070/010Relocate Malware
A-TITLE T1070.010
/techniques/T1202Indirect Command Execution
A-TITLE T1202
/techniques/T1036Masquerading (11)
A-TITLE T1036
/techniques/T1036/001Invalid Code Signature
A-TITLE T1036.001
/techniques/T1036/002Right-to-Left Override
A-TITLE T1036.002
/techniques/T1036/003Rename Legitimate Utilities
A-TITLE T1036.003
/techniques/T1036/004Masquerade Task or Service
A-TITLE T1036.004
/techniques/T1036/005Match Legitimate Resource Name or Location
A-TITLE T1036.005
/techniques/T1036/006Space after Filename
A-TITLE T1036.006
/techniques/T1036/007Double File Extension
A-TITLE T1036.007
/techniques/T1036/008Masquerade File Type
A-TITLE T1036.008
/techniques/T1036/009Break Process Trees
A-TITLE T1036.009
/techniques/T1036/010Masquerade Account Name
A-TITLE T1036.010
/techniques/T1036/011Overwrite Process Arguments
A-TITLE T1036.011
/techniques/T1556Textduplikat Modify Authentication Process (9)
A-TITLE T1556
/techniques/T1556/001Textduplikat Domain Controller Authentication
A-TITLE T1556.001
/techniques/T1556/002Textduplikat Password Filter DLL
A-TITLE T1556.002
/techniques/T1556/003Textduplikat Pluggable Authentication Modules
A-TITLE T1556.003
/techniques/T1556/004Textduplikat Network Device Authentication
A-TITLE T1556.004
/techniques/T1556/005Textduplikat Reversible Encryption
A-TITLE T1556.005
/techniques/T1556/006Textduplikat Multi-Factor Authentication
A-TITLE T1556.006
/techniques/T1556/007Textduplikat Hybrid Identity
A-TITLE T1556.007
/techniques/T1556/008Textduplikat Network Provider DLL
A-TITLE T1556.008
/techniques/T1556/009Textduplikat Conditional Access Policies
A-TITLE T1556.009
/techniques/T1578Modify Cloud Compute Infrastructure (5)
A-TITLE T1578
/techniques/T1578/001Create Snapshot
A-TITLE T1578.001
/techniques/T1578/002Create Cloud Instance
A-TITLE T1578.002
/techniques/T1578/003Delete Cloud Instance
A-TITLE T1578.003
/techniques/T1578/004Revert Cloud Instance
A-TITLE T1578.004
/techniques/T1578/005Modify Cloud Compute Configurations
A-TITLE T1578.005
/techniques/T1666Modify Cloud Resource Hierarchy
A-TITLE T1666
/techniques/T1112Textduplikat Modify Registry
A-TITLE T1112
/techniques/T1601Modify System Image (2)
A-TITLE T1601
/techniques/T1601/001Patch System Image
A-TITLE T1601.001
/techniques/T1601/002Downgrade System Image
A-TITLE T1601.002
/techniques/T1599Network Boundary Bridging (1)
A-TITLE T1599
/techniques/T1599/001Network Address Translation Traversal
A-TITLE T1599.001
/techniques/T1027Obfuscated Files or Information (17)
A-TITLE T1027
/techniques/T1027/001Binary Padding
A-TITLE T1027.001
/techniques/T1027/002Software Packing
A-TITLE T1027.002
/techniques/T1027/003Steganography
A-TITLE T1027.003
/techniques/T1027/004Compile After Delivery
A-TITLE T1027.004
/techniques/T1027/005Indicator Removal from Tools
A-TITLE T1027.005
/techniques/T1027/006HTML Smuggling
A-TITLE T1027.006
/techniques/T1027/007Dynamic API Resolution
A-TITLE T1027.007
/techniques/T1027/008Stripped Payloads
A-TITLE T1027.008
/techniques/T1027/009Embedded Payloads
A-TITLE T1027.009
/techniques/T1027/010Command Obfuscation
A-TITLE T1027.010
/techniques/T1027/011Fileless Storage
A-TITLE T1027.011
/techniques/T1027/012LNK Icon Smuggling
A-TITLE T1027.012
/techniques/T1027/013Encrypted/Encoded File
A-TITLE T1027.013
/techniques/T1027/014Polymorphic Code
A-TITLE T1027.014
/techniques/T1027/015Compression
A-TITLE T1027.015
/techniques/T1027/016Junk Code Insertion
A-TITLE T1027.016
/techniques/T1027/017SVG Smuggling
A-TITLE T1027.017
/techniques/T1647Plist File Modification
A-TITLE T1647
/techniques/T1542Textduplikat Pre-OS Boot (5)
A-TITLE T1542
/techniques/T1542/001Textduplikat System Firmware
A-TITLE T1542.001
/techniques/T1542/002Textduplikat Component Firmware
A-TITLE T1542.002
/techniques/T1542/003Textduplikat Bootkit
A-TITLE T1542.003
/techniques/T1542/004Textduplikat ROMMONkit
A-TITLE T1542.004
/techniques/T1542/005Textduplikat TFTP Boot
A-TITLE T1542.005
/techniques/T1055Textduplikat Process Injection (12)
A-TITLE T1055
/techniques/T1055/001Textduplikat Dynamic-link Library Injection
A-TITLE T1055.001
/techniques/T1055/002Textduplikat Portable Executable Injection
A-TITLE T1055.002
/techniques/T1055/003Textduplikat Thread Execution Hijacking
A-TITLE T1055.003
/techniques/T1055/004Textduplikat Asynchronous Procedure Call
A-TITLE T1055.004
/techniques/T1055/005Textduplikat Thread Local Storage
A-TITLE T1055.005
/techniques/T1055/008Textduplikat Ptrace System Calls
A-TITLE T1055.008
/techniques/T1055/009Textduplikat Proc Memory
A-TITLE T1055.009
/techniques/T1055/011Textduplikat Extra Window Memory Injection
A-TITLE T1055.011
/techniques/T1055/012Textduplikat Process Hollowing
A-TITLE T1055.012
/techniques/T1055/013Textduplikat Process Doppelg??nging
A-TITLE T1055.013
/techniques/T1055/014Textduplikat VDSO Hijacking
A-TITLE T1055.014
/techniques/T1055/015Textduplikat ListPlanting
A-TITLE T1055.015
/techniques/T1620Reflective Code Loading
A-TITLE T1620
/techniques/T1207Rogue Domain Controller
A-TITLE T1207
/techniques/T1014Rootkit
A-TITLE T1014
/techniques/T1553Subvert Trust Controls (6)
A-TITLE T1553
/techniques/T1553/001Gatekeeper Bypass
A-TITLE T1553.001
/techniques/T1553/002Code Signing
A-TITLE T1553.002
/techniques/T1553/003SIP and Trust Provider Hijacking
A-TITLE T1553.003
/techniques/T1553/004Install Root Certificate
A-TITLE T1553.004
/techniques/T1553/005Mark-of-the-Web Bypass
A-TITLE T1553.005
/techniques/T1553/006Code Signing Policy Modification
A-TITLE T1553.006
/techniques/T1218System Binary Proxy Execution (14)
A-TITLE T1218
/techniques/T1218/001Compiled HTML File
A-TITLE T1218.001
/techniques/T1218/002Control Panel
A-TITLE T1218.002
/techniques/T1218/003CMSTP
A-TITLE T1218.003
/techniques/T1218/004InstallUtil
A-TITLE T1218.004
/techniques/T1218/005Mshta
A-TITLE T1218.005
/techniques/T1218/007Msiexec
A-TITLE T1218.007
/techniques/T1218/008Odbcconf
A-TITLE T1218.008
/techniques/T1218/009Regsvcs/Regasm
A-TITLE T1218.009
/techniques/T1218/010Regsvr32
A-TITLE T1218.010
/techniques/T1218/011Rundll32
A-TITLE T1218.011
/techniques/T1218/012Verclsid
A-TITLE T1218.012
/techniques/T1218/013Mavinject
A-TITLE T1218.013
/techniques/T1218/014MMC
A-TITLE T1218.014
/techniques/T1218/015Electron Applications
A-TITLE T1218.015
/techniques/T1216System Script Proxy Execution (2)
A-TITLE T1216
/techniques/T1216/001PubPrn
A-TITLE T1216.001
/techniques/T1216/002SyncAppvPublishingServer
A-TITLE T1216.002
/techniques/T1221Template Injection
A-TITLE T1221
/techniques/T1205Textduplikat Traffic Signaling (2)
A-TITLE T1205
/techniques/T1205/001Textduplikat Port Knocking
A-TITLE T1205.001
/techniques/T1205/002Textduplikat Socket Filters
A-TITLE T1205.002
/techniques/T1127Trusted Developer Utilities Proxy Execution (3)
A-TITLE T1127
/techniques/T1127/001MSBuild
A-TITLE T1127.001
/techniques/T1127/002ClickOnce
A-TITLE T1127.002
/techniques/T1127/003JamPlus
A-TITLE T1127.003
/techniques/T1535Unused/Unsupported Cloud Regions
A-TITLE T1535
/techniques/T1550Use Alternate Authentication Material (4)
A-TITLE T1550
/techniques/T1550/001Application Access Token
A-TITLE T1550.001
/techniques/T1550/002Pass the Hash
A-TITLE T1550.002
/techniques/T1550/003Pass the Ticket
A-TITLE T1550.003
/techniques/T1550/004Web Session Cookie
A-TITLE T1550.004
/techniques/T1078Textduplikat Valid Accounts (4)
A-TITLE T1078
/techniques/T1078/001Textduplikat Default Accounts
A-TITLE T1078.001
/techniques/T1078/002Textduplikat Domain Accounts
A-TITLE T1078.002
/techniques/T1078/003Textduplikat Local Accounts
A-TITLE T1078.003
/techniques/T1078/004Textduplikat Cloud Accounts
A-TITLE T1078.004
/techniques/T1497Virtualization/Sandbox Evasion (3)
A-TITLE T1497
/techniques/T1497/001System Checks
A-TITLE T1497.001
/techniques/T1497/002User Activity Based Checks
A-TITLE T1497.002
/techniques/T1497/003Time Based Evasion
A-TITLE T1497.003
/techniques/T1600Weaken Encryption (2)
A-TITLE T1600
/techniques/T1600/001Reduce Key Space
A-TITLE T1600.001
/techniques/T1600/002Disable Crypto Hardware
A-TITLE T1600.002
/techniques/T1220XSL Script Processing
A-TITLE T1220
/techniques/T1557Adversary-in-the-Middle (4)
A-TITLE T1557
/techniques/T1557/001LLMNR/NBT-NS Poisoning and SMB Relay
A-TITLE T1557.001
/techniques/T1557/002ARP Cache Poisoning
A-TITLE T1557.002
/techniques/T1557/003DHCP Spoofing
A-TITLE T1557.003
/techniques/T1557/004Evil Twin
A-TITLE T1557.004
/techniques/T1110Brute Force (4)
A-TITLE T1110
/techniques/T1110/001Password Guessing
A-TITLE T1110.001
/techniques/T1110/002Password Cracking
A-TITLE T1110.002
/techniques/T1110/003Password Spraying
A-TITLE T1110.003
/techniques/T1110/004Credential Stuffing
A-TITLE T1110.004
/techniques/T1555Credentials from Password Stores (6)
A-TITLE T1555
/techniques/T1555/001Keychain
A-TITLE T1555.001
/techniques/T1555/002Securityd Memory
A-TITLE T1555.002
/techniques/T1555/003Credentials from Web Browsers
A-TITLE T1555.003
/techniques/T1555/004Windows Credential Manager
A-TITLE T1555.004
/techniques/T1555/005Password Managers
A-TITLE T1555.005
/techniques/T1555/006Cloud Secrets Management Stores
A-TITLE T1555.006
/techniques/T1212Exploitation for Credential Access
A-TITLE T1212
/techniques/T1187Forced Authentication
A-TITLE T1187
/techniques/T1606Forge Web Credentials (2)
A-TITLE T1606
/techniques/T1606/001Web Cookies
A-TITLE T1606.001
/techniques/T1606/002SAML Tokens
A-TITLE T1606.002
/techniques/T1056Input Capture (4)
A-TITLE T1056
/techniques/T1056/001Keylogging
A-TITLE T1056.001
/techniques/T1056/002GUI Input Capture
A-TITLE T1056.002
/techniques/T1056/003Web Portal Capture
A-TITLE T1056.003
/techniques/T1056/004Credential API Hooking
A-TITLE T1056.004
/techniques/T1556Textduplikat Modify Authentication Process (9)
A-TITLE T1556
/techniques/T1556/001Textduplikat Domain Controller Authentication
A-TITLE T1556.001
/techniques/T1556/002Textduplikat Password Filter DLL
A-TITLE T1556.002
/techniques/T1556/003Textduplikat Pluggable Authentication Modules
A-TITLE T1556.003
/techniques/T1556/004Textduplikat Network Device Authentication
A-TITLE T1556.004
/techniques/T1556/005Textduplikat Reversible Encryption
A-TITLE T1556.005
/techniques/T1556/006Textduplikat Multi-Factor Authentication
A-TITLE T1556.006
/techniques/T1556/007Textduplikat Hybrid Identity
A-TITLE T1556.007
/techniques/T1556/008Textduplikat Network Provider DLL
A-TITLE T1556.008
/techniques/T1556/009Textduplikat Conditional Access Policies
A-TITLE T1556.009
/techniques/T1111Multi-Factor Authentication Interception
A-TITLE T1111
/techniques/T1621Multi-Factor Authentication Request Generation
A-TITLE T1621
/techniques/T1040Network Sniffing
A-TITLE T1040
/techniques/T1003OS Credential Dumping (8)
A-TITLE T1003
/techniques/T1003/001LSASS Memory
A-TITLE T1003.001
/techniques/T1003/002Security Account Manager
A-TITLE T1003.002
/techniques/T1003/003NTDS
A-TITLE T1003.003
/techniques/T1003/004LSA Secrets
A-TITLE T1003.004
/techniques/T1003/005Cached Domain Credentials
A-TITLE T1003.005
/techniques/T1003/006DCSync
A-TITLE T1003.006
/techniques/T1003/007Proc Filesystem
A-TITLE T1003.007
/techniques/T1003/008/etc/passwd and /etc/shadow
A-TITLE T1003.008
/techniques/T1528Steal Application Access Token
A-TITLE T1528
/techniques/T1649Steal or Forge Authentication Certificates
A-TITLE T1649
/techniques/T1558Steal or Forge Kerberos Tickets (5)
A-TITLE T1558
/techniques/T1558/001Golden Ticket
A-TITLE T1558.001
/techniques/T1558/002Silver Ticket
A-TITLE T1558.002
/techniques/T1558/003Kerberoasting
A-TITLE T1558.003
/techniques/T1558/004AS-REP Roasting
A-TITLE T1558.004
/techniques/T1558/005Ccache Files
A-TITLE T1558.005
/techniques/T1539Steal Web Session Cookie
A-TITLE T1539
/techniques/T1552Unsecured Credentials (8)
A-TITLE T1552
/techniques/T1552/001Credentials In Files
A-TITLE T1552.001
/techniques/T1552/002Credentials in Registry
A-TITLE T1552.002
/techniques/T1552/003Bash History
A-TITLE T1552.003
/techniques/T1552/004Private Keys
A-TITLE T1552.004
/techniques/T1552/005Cloud Instance Metadata API
A-TITLE T1552.005
/techniques/T1552/006Group Policy Preferences
A-TITLE T1552.006
/techniques/T1552/007Container API
A-TITLE T1552.007
/techniques/T1552/008Chat Messages
A-TITLE T1552.008
/techniques/T1087Account Discovery (4)
A-TITLE T1087
/techniques/T1087/001Textduplikat Local Account
A-TITLE T1087.001
/techniques/T1087/002Textduplikat Domain Account
A-TITLE T1087.002
/techniques/T1087/003Email Account
A-TITLE T1087.003
/techniques/T1087/004Textduplikat Cloud Account
A-TITLE T1087.004
/techniques/T1010Application Window Discovery
A-TITLE T1010
/techniques/T1217Browser Information Discovery
A-TITLE T1217
/techniques/T1580Cloud Infrastructure Discovery
A-TITLE T1580
/techniques/T1538Cloud Service Dashboard
A-TITLE T1538
/techniques/T1526Cloud Service Discovery
A-TITLE T1526
/techniques/T1619Cloud Storage Object Discovery
A-TITLE T1619
/techniques/T1613Container and Resource Discovery
A-TITLE T1613
/techniques/T1622Textduplikat Debugger Evasion
A-TITLE T1622
/techniques/T1652Device Driver Discovery
A-TITLE T1652
/techniques/T1482Domain Trust Discovery
A-TITLE T1482
/techniques/T1083File and Directory Discovery
A-TITLE T1083
/techniques/T1615Group Policy Discovery
A-TITLE T1615
/techniques/T1654Log Enumeration
A-TITLE T1654
/techniques/T1046Network Service Discovery
A-TITLE T1046
/techniques/T1135Network Share Discovery
A-TITLE T1135
/techniques/T1040Textduplikat Network Sniffing
A-TITLE T1040
/techniques/T1201Password Policy Discovery
A-TITLE T1201
/techniques/T1120Peripheral Device Discovery
A-TITLE T1120
/techniques/T1069Permission Groups Discovery (3)
A-TITLE T1069
/techniques/T1069/001Local Groups
A-TITLE T1069.001
/techniques/T1069/002Domain Groups
A-TITLE T1069.002
/techniques/T1069/003Cloud Groups
A-TITLE T1069.003
/techniques/T1057Process Discovery
A-TITLE T1057
/techniques/T1012Query Registry
A-TITLE T1012
/techniques/T1018Remote System Discovery
A-TITLE T1018
/techniques/T1518Software Discovery (1)
A-TITLE T1518
/techniques/T1518/001Security Software Discovery
A-TITLE T1518.001
/techniques/T1082System Information Discovery
A-TITLE T1082
/techniques/T1614System Location Discovery (1)
A-TITLE T1614
/techniques/T1614/001System Language Discovery
A-TITLE T1614.001
/techniques/T1016System Network Configuration Discovery (2)
A-TITLE T1016
/techniques/T1016/001Internet Connection Discovery
A-TITLE T1016.001
/techniques/T1016/002Wi-Fi Discovery
A-TITLE T1016.002
/techniques/T1049System Network Connections Discovery
A-TITLE T1049
/techniques/T1033System Owner/User Discovery
A-TITLE T1033
/techniques/T1007System Service Discovery
A-TITLE T1007
/techniques/T1124System Time Discovery
A-TITLE T1124
/techniques/T1673Virtual Machine Discovery
A-TITLE T1673
/techniques/T1497Textduplikat Virtualization/Sandbox Evasion (3)
A-TITLE T1497
/techniques/T1497/001Textduplikat System Checks
A-TITLE T1497.001
/techniques/T1497/002Textduplikat User Activity Based Checks
A-TITLE T1497.002
/techniques/T1497/003Textduplikat Time Based Evasion
A-TITLE T1497.003
/techniques/T1210Exploitation of Remote Services
A-TITLE T1210
/techniques/T1534Internal Spearphishing
A-TITLE T1534
/techniques/T1570Lateral Tool Transfer
A-TITLE T1570
/techniques/T1563Remote Service Session Hijacking (2)
A-TITLE T1563
/techniques/T1563/001SSH Hijacking
A-TITLE T1563.001
/techniques/T1563/002RDP Hijacking
A-TITLE T1563.002
/techniques/T1021Remote Services (8)
A-TITLE T1021
/techniques/T1021/001Remote Desktop Protocol
A-TITLE T1021.001
/techniques/T1021/002SMB/Windows Admin Shares
A-TITLE T1021.002
/techniques/T1021/003Distributed Component Object Model
A-TITLE T1021.003
/techniques/T1021/004SSH
A-TITLE T1021.004
/techniques/T1021/005VNC
A-TITLE T1021.005
/techniques/T1021/006Windows Remote Management
A-TITLE T1021.006
/techniques/T1021/007Cloud Services
A-TITLE T1021.007
/techniques/T1021/008Direct Cloud VM Connections
A-TITLE T1021.008
/techniques/T1091Textduplikat Replication Through Removable Media
A-TITLE T1091
/techniques/T1072Textduplikat Software Deployment Tools
A-TITLE T1072
/techniques/T1080Taint Shared Content
A-TITLE T1080
/techniques/T1550Textduplikat Use Alternate Authentication Material (4)
A-TITLE T1550
/techniques/T1550/001Textduplikat Application Access Token
A-TITLE T1550.001
/techniques/T1550/002Textduplikat Pass the Hash
A-TITLE T1550.002
/techniques/T1550/003Textduplikat Pass the Ticket
A-TITLE T1550.003
/techniques/T1550/004Textduplikat Web Session Cookie
A-TITLE T1550.004
/techniques/T1557Textduplikat Adversary-in-the-Middle (4)
A-TITLE T1557
/techniques/T1557/001Textduplikat LLMNR/NBT-NS Poisoning and SMB Relay
A-TITLE T1557.001
/techniques/T1557/002Textduplikat ARP Cache Poisoning
A-TITLE T1557.002
/techniques/T1557/003Textduplikat DHCP Spoofing
A-TITLE T1557.003
/techniques/T1557/004Textduplikat Evil Twin
A-TITLE T1557.004
/techniques/T1560Archive Collected Data (3)
A-TITLE T1560
/techniques/T1560/001Archive via Utility
A-TITLE T1560.001
/techniques/T1560/002Archive via Library
A-TITLE T1560.002
/techniques/T1560/003Archive via Custom Method
A-TITLE T1560.003
/techniques/T1123Audio Capture
A-TITLE T1123
/techniques/T1119Automated Collection
A-TITLE T1119
/techniques/T1185Browser Session Hijacking
A-TITLE T1185
/techniques/T1115Clipboard Data
A-TITLE T1115
/techniques/T1530Data from Cloud Storage
A-TITLE T1530
/techniques/T1602Data from Configuration Repository (2)
A-TITLE T1602
/techniques/T1602/001SNMP (MIB Dump)
A-TITLE T1602.001
/techniques/T1602/002Network Device Configuration Dump
A-TITLE T1602.002
/techniques/T1213Data from Information Repositories (5)
A-TITLE T1213
/techniques/T1213/001Confluence
A-TITLE T1213.001
/techniques/T1213/002Sharepoint
A-TITLE T1213.002
/techniques/T1213/003Textduplikat Code Repositories
A-TITLE T1213.003
/techniques/T1213/004Customer Relationship Management Software
A-TITLE T1213.004
/techniques/T1213/005Messaging Applications
A-TITLE T1213.005
/techniques/T1005Data from Local System
A-TITLE T1005
/techniques/T1039Data from Network Shared Drive
A-TITLE T1039
/techniques/T1025Data from Removable Media
A-TITLE T1025
/techniques/T1074Data Staged (2)
A-TITLE T1074
/techniques/T1074/001Local Data Staging
A-TITLE T1074.001
/techniques/T1074/002Remote Data Staging
A-TITLE T1074.002
/techniques/T1114Email Collection (3)
A-TITLE T1114
/techniques/T1114/001Local Email Collection
A-TITLE T1114.001
/techniques/T1114/002Remote Email Collection
A-TITLE T1114.002
/techniques/T1114/003Email Forwarding Rule
A-TITLE T1114.003
/techniques/T1056Textduplikat Input Capture (4)
A-TITLE T1056
/techniques/T1056/001Textduplikat Keylogging
A-TITLE T1056.001
/techniques/T1056/002Textduplikat GUI Input Capture
A-TITLE T1056.002
/techniques/T1056/003Textduplikat Web Portal Capture
A-TITLE T1056.003
/techniques/T1056/004Textduplikat Credential API Hooking
A-TITLE T1056.004
/techniques/T1113Screen Capture
A-TITLE T1113
/techniques/T1125Video Capture
A-TITLE T1125
/techniques/T1071Application Layer Protocol (5)
A-TITLE T1071
/techniques/T1071/001Web Protocols
A-TITLE T1071.001
/techniques/T1071/002File Transfer Protocols
A-TITLE T1071.002
/techniques/T1071/003Mail Protocols
A-TITLE T1071.003
/techniques/T1071/004Textduplikat DNS
A-TITLE T1071.004
/techniques/T1071/005Publish/Subscribe Protocols
A-TITLE T1071.005
/techniques/T1092Communication Through Removable Media
A-TITLE T1092
/techniques/T1659Textduplikat Content Injection
A-TITLE T1659
/techniques/T1132Data Encoding (2)
A-TITLE T1132
/techniques/T1132/001Standard Encoding
A-TITLE T1132.001
/techniques/T1132/002Non-Standard Encoding
A-TITLE T1132.002
/techniques/T1001Data Obfuscation (3)
A-TITLE T1001
/techniques/T1001/001Junk Data
A-TITLE T1001.001
/techniques/T1001/002Textduplikat Steganography
A-TITLE T1001.002
/techniques/T1001/003Protocol or Service Impersonation
A-TITLE T1001.003
/techniques/T1568Dynamic Resolution (3)
A-TITLE T1568
/techniques/T1568/001Fast Flux DNS
A-TITLE T1568.001
/techniques/T1568/002Domain Generation Algorithms
A-TITLE T1568.002
/techniques/T1568/003DNS Calculation
A-TITLE T1568.003
/techniques/T1573Encrypted Channel (2)
A-TITLE T1573
/techniques/T1573/001Symmetric Cryptography
A-TITLE T1573.001
/techniques/T1573/002Asymmetric Cryptography
A-TITLE T1573.002
/techniques/T1008Fallback Channels
A-TITLE T1008
/techniques/T1665Hide Infrastructure
A-TITLE T1665
/techniques/T1105Ingress Tool Transfer
A-TITLE T1105
/techniques/T1104Multi-Stage Channels
A-TITLE T1104
/techniques/T1095Non-Application Layer Protocol
A-TITLE T1095
/techniques/T1571Non-Standard Port
A-TITLE T1571
/techniques/T1572Protocol Tunneling
A-TITLE T1572
/techniques/T1090Proxy (4)
A-TITLE T1090
/techniques/T1090/001Internal Proxy
A-TITLE T1090.001
/techniques/T1090/002External Proxy
A-TITLE T1090.002
/techniques/T1090/003Multi-hop Proxy
A-TITLE T1090.003
/techniques/T1090/004Domain Fronting
A-TITLE T1090.004
/techniques/T1219Remote Access Tools (3)
A-TITLE T1219
/techniques/T1219/001IDE Tunneling
A-TITLE T1219.001
/techniques/T1219/002Remote Desktop Software
A-TITLE T1219.002
/techniques/T1219/003Remote Access Hardware
A-TITLE T1219.003
/techniques/T1205Textduplikat Traffic Signaling (2)
A-TITLE T1205
/techniques/T1205/001Textduplikat Port Knocking
A-TITLE T1205.001
/techniques/T1205/002Textduplikat Socket Filters
A-TITLE T1205.002
/techniques/T1102Web Service (3)
A-TITLE T1102
/techniques/T1102/001Dead Drop Resolver
A-TITLE T1102.001
/techniques/T1102/002Bidirectional Communication
A-TITLE T1102.002
/techniques/T1102/003One-Way Communication
A-TITLE T1102.003
/techniques/T1020Automated Exfiltration (1)
A-TITLE T1020
/techniques/T1020/001Traffic Duplication
A-TITLE T1020.001
/techniques/T1030Data Transfer Size Limits
A-TITLE T1030
/techniques/T1048Exfiltration Over Alternative Protocol (3)
A-TITLE T1048
/techniques/T1048/001Exfiltration Over Symmetric Encrypted Non-C2 Protocol
A-TITLE T1048.001
/techniques/T1048/002Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
A-TITLE T1048.002
/techniques/T1048/003Exfiltration Over Unencrypted Non-C2 Protocol
A-TITLE T1048.003
/techniques/T1041Exfiltration Over C2 Channel
A-TITLE T1041
/techniques/T1011Exfiltration Over Other Network Medium (1)
A-TITLE T1011
/techniques/T1011/001Exfiltration Over Bluetooth
A-TITLE T1011.001
/techniques/T1052Exfiltration Over Physical Medium (1)
A-TITLE T1052
/techniques/T1052/001Exfiltration over USB
A-TITLE T1052.001
/techniques/T1567Exfiltration Over Web Service (4)
A-TITLE T1567
/techniques/T1567/001Exfiltration to Code Repository
A-TITLE T1567.001
/techniques/T1567/002Exfiltration to Cloud Storage
A-TITLE T1567.002
/techniques/T1567/003Exfiltration to Text Storage Sites
A-TITLE T1567.003
/techniques/T1567/004Exfiltration Over Webhook
A-TITLE T1567.004
/techniques/T1029Scheduled Transfer
A-TITLE T1029
/techniques/T1537Transfer Data to Cloud Account
A-TITLE T1537
/techniques/T1531Account Access Removal
A-TITLE T1531
/techniques/T1485Data Destruction (1)
A-TITLE T1485
/techniques/T1485/001Lifecycle-Triggered Deletion
A-TITLE T1485.001
/techniques/T1486Data Encrypted for Impact
A-TITLE T1486
/techniques/T1565Data Manipulation (3)
A-TITLE T1565
/techniques/T1565/001Stored Data Manipulation
A-TITLE T1565.001
/techniques/T1565/002Transmitted Data Manipulation
A-TITLE T1565.002
/techniques/T1565/003Runtime Data Manipulation
A-TITLE T1565.003
/techniques/T1491Defacement (2)
A-TITLE T1491
/techniques/T1491/001Internal Defacement
A-TITLE T1491.001
/techniques/T1491/002External Defacement
A-TITLE T1491.002
/techniques/T1561Disk Wipe (2)
A-TITLE T1561
/techniques/T1561/001Disk Content Wipe
A-TITLE T1561.001
/techniques/T1561/002Disk Structure Wipe
A-TITLE T1561.002
/techniques/T1667Email Bombing
A-TITLE T1667
/techniques/T1499Endpoint Denial of Service (4)
A-TITLE T1499
/techniques/T1499/001OS Exhaustion Flood
A-TITLE T1499.001
/techniques/T1499/002Service Exhaustion Flood
A-TITLE T1499.002
/techniques/T1499/003Application Exhaustion Flood
A-TITLE T1499.003
/techniques/T1499/004Application or System Exploitation
A-TITLE T1499.004
/techniques/T1657Financial Theft
A-TITLE T1657
/techniques/T1495Firmware Corruption
A-TITLE T1495
/techniques/T1490Inhibit System Recovery
A-TITLE T1490
/techniques/T1498Network Denial of Service (2)
A-TITLE T1498
/techniques/T1498/001Direct Network Flood
A-TITLE T1498.001
/techniques/T1498/002Reflection Amplification
A-TITLE T1498.002
/techniques/T1496Resource Hijacking (4)
A-TITLE T1496
/techniques/T1496/001Compute Hijacking
A-TITLE T1496.001
/techniques/T1496/002Bandwidth Hijacking
A-TITLE T1496.002
/techniques/T1496/003SMS Pumping
A-TITLE T1496.003
/techniques/T1496/004Cloud Service Hijacking
A-TITLE T1496.004
/techniques/T1489Service Stop
A-TITLE T1489
/techniques/T1529System Shutdown/Reboot
A-TITLE T1529
/tactics/TA0043Textduplikat Reconnaissance
A-TITLE TA0043
/tactics/TA0042Textduplikat Resource Development
A-TITLE TA0042
/tactics/TA0001Textduplikat Initial Access
A-TITLE TA0001
/tactics/TA0002Textduplikat Execution
A-TITLE TA0002
/tactics/TA0003Textduplikat Persistence
A-TITLE TA0003
/tactics/TA0004Textduplikat Privilege Escalation
A-TITLE TA0004
/tactics/TA0005Textduplikat Defense Evasion
A-TITLE TA0005
/tactics/TA0006Textduplikat Credential Access
A-TITLE TA0006
/tactics/TA0007Textduplikat Discovery
A-TITLE TA0007
/tactics/TA0008Textduplikat Lateral Movement
A-TITLE TA0008
/tactics/TA0009Textduplikat Collection
A-TITLE TA0009
/tactics/TA0011Textduplikat Command and Control
A-TITLE TA0011
/tactics/TA0010Textduplikat Exfiltration
A-TITLE TA0010
/tactics/TA0040Textduplikat Impact
A-TITLE TA0040
/techniques/T1595Textduplikat Active Scanning (3)
A-TITLE T1595
/techniques/T1595/001Textduplikat Scanning IP Blocks
A-TITLE T1595.001
/techniques/T1595/002Textduplikat Vulnerability Scanning
A-TITLE T1595.002
/techniques/T1595/003Textduplikat Wordlist Scanning
A-TITLE T1595.003
/techniques/T1592Textduplikat Gather Victim Host Information (4)
A-TITLE T1592
/techniques/T1592/001Textduplikat Hardware
A-TITLE T1592.001
/techniques/T1592/002Textduplikat Software
A-TITLE T1592.002
/techniques/T1592/003Textduplikat Firmware
A-TITLE T1592.003
/techniques/T1592/004Textduplikat Client Configurations
A-TITLE T1592.004
/techniques/T1589Textduplikat Gather Victim Identity Information (3)
A-TITLE T1589
/techniques/T1589/001Textduplikat Credentials
A-TITLE T1589.001
/techniques/T1589/002Textduplikat Email Addresses
A-TITLE T1589.002
/techniques/T1589/003Textduplikat Employee Names
A-TITLE T1589.003
/techniques/T1590Textduplikat Gather Victim Network Information (6)
A-TITLE T1590
/techniques/T1590/001Textduplikat Domain Properties
A-TITLE T1590.001
/techniques/T1590/002Textduplikat DNS
A-TITLE T1590.002
/techniques/T1590/003Textduplikat Network Trust Dependencies
A-TITLE T1590.003
/techniques/T1590/004Textduplikat Network Topology
A-TITLE T1590.004
/techniques/T1590/005Textduplikat IP Addresses
A-TITLE T1590.005
/techniques/T1590/006Textduplikat Network Security Appliances
A-TITLE T1590.006
/techniques/T1591Textduplikat Gather Victim Org Information (4)
A-TITLE T1591
/techniques/T1591/001Textduplikat Determine Physical Locations
A-TITLE T1591.001
/techniques/T1591/002Textduplikat Business Relationships
A-TITLE T1591.002
/techniques/T1591/003Textduplikat Identify Business Tempo
A-TITLE T1591.003
/techniques/T1591/004Textduplikat Identify Roles
A-TITLE T1591.004
/techniques/T1598Textduplikat Phishing for Information (4)
A-TITLE T1598
/techniques/T1598/001Textduplikat Spearphishing Service
A-TITLE T1598.001
/techniques/T1598/002Textduplikat Spearphishing Attachment
A-TITLE T1598.002
/techniques/T1598/003Textduplikat Spearphishing Link
A-TITLE T1598.003
/techniques/T1598/004Textduplikat Spearphishing Voice
A-TITLE T1598.004
/techniques/T1597Textduplikat Search Closed Sources (2)
A-TITLE T1597
/techniques/T1597/001Textduplikat Threat Intel Vendors
A-TITLE T1597.001
/techniques/T1597/002Textduplikat Purchase Technical Data
A-TITLE T1597.002
/techniques/T1596Textduplikat Search Open Technical Databases (5)
A-TITLE T1596
/techniques/T1596/001Textduplikat DNS/Passive DNS
A-TITLE T1596.001
/techniques/T1596/002Textduplikat WHOIS
A-TITLE T1596.002
/techniques/T1596/003Textduplikat Digital Certificates
A-TITLE T1596.003
/techniques/T1596/004Textduplikat CDNs
A-TITLE T1596.004
/techniques/T1596/005Textduplikat Scan Databases
A-TITLE T1596.005
/techniques/T1593Textduplikat Search Open Websites/Domains (3)
A-TITLE T1593
/techniques/T1593/001Textduplikat Social Media
A-TITLE T1593.001
/techniques/T1593/002Textduplikat Search Engines
A-TITLE T1593.002
/techniques/T1593/003Textduplikat Code Repositories
A-TITLE T1593.003
/techniques/T1594Textduplikat Search Victim-Owned Websites
A-TITLE T1594
/techniques/T1650Textduplikat Acquire Access
A-TITLE T1650
/techniques/T1583Textduplikat Acquire Infrastructure (8)
A-TITLE T1583
/techniques/T1583/001Textduplikat Domains
A-TITLE T1583.001
/techniques/T1583/002Textduplikat DNS Server
A-TITLE T1583.002
/techniques/T1583/003Textduplikat Virtual Private Server
A-TITLE T1583.003
/techniques/T1583/004Textduplikat Server
A-TITLE T1583.004
/techniques/T1583/005Textduplikat Botnet
A-TITLE T1583.005
/techniques/T1583/006Textduplikat Web Services
A-TITLE T1583.006
/techniques/T1583/007Textduplikat Serverless
A-TITLE T1583.007
/techniques/T1583/008Textduplikat Malvertising
A-TITLE T1583.008
/techniques/T1586Textduplikat Compromise Accounts (3)
A-TITLE T1586
/techniques/T1586/001Textduplikat Social Media Accounts
A-TITLE T1586.001
/techniques/T1586/002Textduplikat Email Accounts
A-TITLE T1586.002
/techniques/T1586/003Textduplikat Cloud Accounts
A-TITLE T1586.003
/techniques/T1584Textduplikat Compromise Infrastructure (8)
A-TITLE T1584
/techniques/T1584/001Textduplikat Domains
A-TITLE T1584.001
/techniques/T1584/002Textduplikat DNS Server
A-TITLE T1584.002
/techniques/T1584/003Textduplikat Virtual Private Server
A-TITLE T1584.003
/techniques/T1584/004Textduplikat Server
A-TITLE T1584.004
/techniques/T1584/005Textduplikat Botnet
A-TITLE T1584.005
/techniques/T1584/006Textduplikat Web Services
A-TITLE T1584.006
/techniques/T1584/007Textduplikat Serverless
A-TITLE T1584.007
/techniques/T1584/008Textduplikat Network Devices
A-TITLE T1584.008
/techniques/T1587Textduplikat Develop Capabilities (4)
A-TITLE T1587
/techniques/T1587/001Textduplikat Malware
A-TITLE T1587.001
/techniques/T1587/002Textduplikat Code Signing Certificates
A-TITLE T1587.002
/techniques/T1587/003Textduplikat Digital Certificates
A-TITLE T1587.003
/techniques/T1587/004Textduplikat Exploits
A-TITLE T1587.004
/techniques/T1585Textduplikat Establish Accounts (3)
A-TITLE T1585
/techniques/T1585/001Textduplikat Social Media Accounts
A-TITLE T1585.001
/techniques/T1585/002Textduplikat Email Accounts
A-TITLE T1585.002
/techniques/T1585/003Textduplikat Cloud Accounts
A-TITLE T1585.003
/techniques/T1588Textduplikat Obtain Capabilities (7)
A-TITLE T1588
/techniques/T1588/001Textduplikat Malware
A-TITLE T1588.001
/techniques/T1588/002Textduplikat Tool
A-TITLE T1588.002
/techniques/T1588/003Textduplikat Code Signing Certificates
A-TITLE T1588.003
/techniques/T1588/004Textduplikat Digital Certificates
A-TITLE T1588.004
/techniques/T1588/005Textduplikat Exploits
A-TITLE T1588.005
/techniques/T1588/006Textduplikat Vulnerabilities
A-TITLE T1588.006
/techniques/T1588/007Textduplikat Artificial Intelligence
A-TITLE T1588.007
/techniques/T1608Textduplikat Stage Capabilities (6)
A-TITLE T1608
/techniques/T1608/001Textduplikat Upload Malware
A-TITLE T1608.001
/techniques/T1608/002Textduplikat Upload Tool
A-TITLE T1608.002
/techniques/T1608/003Textduplikat Install Digital Certificate
A-TITLE T1608.003
/techniques/T1608/004Textduplikat Drive-by Target
A-TITLE T1608.004
/techniques/T1608/005Textduplikat Link Target
A-TITLE T1608.005
/techniques/T1608/006Textduplikat SEO Poisoning
A-TITLE T1608.006
/techniques/T1659Textduplikat Content Injection
A-TITLE T1659
/techniques/T1189Textduplikat Drive-by Compromise
A-TITLE T1189
/techniques/T1190Textduplikat Exploit Public-Facing Application
A-TITLE T1190
/techniques/T1133Textduplikat External Remote Services
A-TITLE T1133
/techniques/T1200Textduplikat Hardware Additions
A-TITLE T1200
/techniques/T1566Textduplikat Phishing (4)
A-TITLE T1566
/techniques/T1566/001Textduplikat Spearphishing Attachment
A-TITLE T1566.001
/techniques/T1566/002Textduplikat Spearphishing Link
A-TITLE T1566.002
/techniques/T1566/003Textduplikat Spearphishing via Service
A-TITLE T1566.003
/techniques/T1566/004Textduplikat Spearphishing Voice
A-TITLE T1566.004
/techniques/T1091Textduplikat Replication Through Removable Media
A-TITLE T1091
/techniques/T1195Textduplikat Supply Chain Compromise (3)
A-TITLE T1195
/techniques/T1195/001Textduplikat Compromise Software Dependencies and Development Tools
A-TITLE T1195.001
/techniques/T1195/002Textduplikat Compromise Software Supply Chain
A-TITLE T1195.002
/techniques/T1195/003Textduplikat Compromise Hardware Supply Chain
A-TITLE T1195.003
/techniques/T1199Textduplikat Trusted Relationship
A-TITLE T1199
/techniques/T1078Textduplikat Valid Accounts (4)
A-TITLE T1078
/techniques/T1078/001Textduplikat Default Accounts
A-TITLE T1078.001
/techniques/T1078/002Textduplikat Domain Accounts
A-TITLE T1078.002
/techniques/T1078/003Textduplikat Local Accounts
A-TITLE T1078.003
/techniques/T1078/004Textduplikat Cloud Accounts
A-TITLE T1078.004
/techniques/T1669Textduplikat Wi-Fi Networks
A-TITLE T1669
/techniques/T1651Textduplikat Cloud Administration Command
A-TITLE T1651
/techniques/T1059Textduplikat Command and Scripting Interpreter (12)
A-TITLE T1059
/techniques/T1059/001Textduplikat PowerShell
A-TITLE T1059.001
/techniques/T1059/002Textduplikat AppleScript
A-TITLE T1059.002
/techniques/T1059/003Textduplikat Windows Command Shell
A-TITLE T1059.003
/techniques/T1059/004Textduplikat Unix Shell
A-TITLE T1059.004
/techniques/T1059/005Textduplikat Visual Basic
A-TITLE T1059.005
/techniques/T1059/006Textduplikat Python
A-TITLE T1059.006
/techniques/T1059/007Textduplikat JavaScript
A-TITLE T1059.007
/techniques/T1059/008Textduplikat Network Device CLI
A-TITLE T1059.008
/techniques/T1059/009Textduplikat Cloud API
A-TITLE T1059.009
/techniques/T1059/010Textduplikat AutoHotKey & AutoIT
A-TITLE T1059.010
/techniques/T1059/011Textduplikat Lua
A-TITLE T1059.011
/techniques/T1059/012Textduplikat Hypervisor CLI
A-TITLE T1059.012
/techniques/T1609Textduplikat Container Administration Command
A-TITLE T1609
/techniques/T1610Textduplikat Deploy Container
A-TITLE T1610
/techniques/T1675Textduplikat ESXi Administration Command
A-TITLE T1675
/techniques/T1203Textduplikat Exploitation for Client Execution
A-TITLE T1203
/techniques/T1674Textduplikat Input Injection
A-TITLE T1674
/techniques/T1559Textduplikat Inter-Process Communication (3)
A-TITLE T1559
/techniques/T1559/001Textduplikat Component Object Model
A-TITLE T1559.001
/techniques/T1559/002Textduplikat Dynamic Data Exchange
A-TITLE T1559.002
/techniques/T1559/003Textduplikat XPC Services
A-TITLE T1559.003
/techniques/T1106Textduplikat Native API
A-TITLE T1106
/techniques/T1053Textduplikat Scheduled Task/Job (5)
A-TITLE T1053
/techniques/T1053/002Textduplikat At
A-TITLE T1053.002
/techniques/T1053/003Textduplikat Cron
A-TITLE T1053.003
/techniques/T1053/005Textduplikat Scheduled Task
A-TITLE T1053.005
/techniques/T1053/006Textduplikat Systemd Timers
A-TITLE T1053.006
/techniques/T1053/007Textduplikat Container Orchestration Job
A-TITLE T1053.007
/techniques/T1648Textduplikat Serverless Execution
A-TITLE T1648
/techniques/T1129Textduplikat Shared Modules
A-TITLE T1129
/techniques/T1072Textduplikat Software Deployment Tools
A-TITLE T1072
/techniques/T1569Textduplikat System Services (3)
A-TITLE T1569
/techniques/T1569/001Textduplikat Launchctl
A-TITLE T1569.001
/techniques/T1569/002Textduplikat Service Execution
A-TITLE T1569.002
/techniques/T1569/003Textduplikat Systemctl
A-TITLE T1569.003
/techniques/T1204Textduplikat User Execution (4)
A-TITLE T1204
/techniques/T1204/001Textduplikat Malicious Link
A-TITLE T1204.001
/techniques/T1204/002Textduplikat Malicious File
A-TITLE T1204.002
/techniques/T1204/003Textduplikat Malicious Image
A-TITLE T1204.003
/techniques/T1204/004Textduplikat Malicious Copy and Paste
A-TITLE T1204.004
/techniques/T1047Textduplikat Windows Management Instrumentation
A-TITLE T1047
/techniques/T1098Textduplikat Account Manipulation (7)
A-TITLE T1098
/techniques/T1098/001Textduplikat Additional Cloud Credentials
A-TITLE T1098.001
/techniques/T1098/002Textduplikat Additional Email Delegate Permissions
A-TITLE T1098.002
/techniques/T1098/003Textduplikat Additional Cloud Roles
A-TITLE T1098.003
/techniques/T1098/004Textduplikat SSH Authorized Keys
A-TITLE T1098.004
/techniques/T1098/005Textduplikat Device Registration
A-TITLE T1098.005
/techniques/T1098/006Textduplikat Additional Container Cluster Roles
A-TITLE T1098.006
/techniques/T1098/007Textduplikat Additional Local or Domain Groups
A-TITLE T1098.007
/techniques/T1197Textduplikat BITS Jobs
A-TITLE T1197
/techniques/T1547Textduplikat Boot or Logon Autostart Execution (14)
A-TITLE T1547
/techniques/T1547/001Textduplikat Registry Run Keys / Startup Folder
A-TITLE T1547.001
/techniques/T1547/002Textduplikat Authentication Package
A-TITLE T1547.002
/techniques/T1547/003Textduplikat Time Providers
A-TITLE T1547.003
/techniques/T1547/004Textduplikat Winlogon Helper DLL
A-TITLE T1547.004
/techniques/T1547/005Textduplikat Security Support Provider
A-TITLE T1547.005
/techniques/T1547/006Textduplikat Kernel Modules and Extensions
A-TITLE T1547.006
/techniques/T1547/007Textduplikat Re-opened Applications
A-TITLE T1547.007
/techniques/T1547/008Textduplikat LSASS Driver
A-TITLE T1547.008
/techniques/T1547/009Textduplikat Shortcut Modification
A-TITLE T1547.009
/techniques/T1547/010Textduplikat Port Monitors
A-TITLE T1547.010
/techniques/T1547/012Textduplikat Print Processors
A-TITLE T1547.012
/techniques/T1547/013Textduplikat XDG Autostart Entries
A-TITLE T1547.013
/techniques/T1547/014Textduplikat Active Setup
A-TITLE T1547.014
/techniques/T1547/015Textduplikat Login Items
A-TITLE T1547.015
/techniques/T1037Textduplikat Boot or Logon Initialization Scripts (5)
A-TITLE T1037
/techniques/T1037/001Textduplikat Logon Script (Windows)
A-TITLE T1037.001
/techniques/T1037/002Textduplikat Login Hook
A-TITLE T1037.002
/techniques/T1037/003Textduplikat Network Logon Script
A-TITLE T1037.003
/techniques/T1037/004Textduplikat RC Scripts
A-TITLE T1037.004
/techniques/T1037/005Textduplikat Startup Items
A-TITLE T1037.005
/techniques/T1671Textduplikat Cloud Application Integration
A-TITLE T1671
/techniques/T1554Textduplikat Compromise Host Software Binary
A-TITLE T1554
/techniques/T1136Textduplikat Create Account (3)
A-TITLE T1136
/techniques/T1136/001Textduplikat Local Account
A-TITLE T1136.001
/techniques/T1136/002Textduplikat Domain Account
A-TITLE T1136.002
/techniques/T1136/003Textduplikat Cloud Account
A-TITLE T1136.003
/techniques/T1543Textduplikat Create or Modify System Process (5)
A-TITLE T1543
/techniques/T1543/001Textduplikat Launch Agent
A-TITLE T1543.001
/techniques/T1543/002Textduplikat Systemd Service
A-TITLE T1543.002
/techniques/T1543/003Textduplikat Windows Service
A-TITLE T1543.003
/techniques/T1543/004Textduplikat Launch Daemon
A-TITLE T1543.004
/techniques/T1543/005Textduplikat Container Service
A-TITLE T1543.005
/techniques/T1546Textduplikat Event Triggered Execution (17)
A-TITLE T1546
/techniques/T1546/001Textduplikat Change Default File Association
A-TITLE T1546.001
/techniques/T1546/002Textduplikat Screensaver
A-TITLE T1546.002
/techniques/T1546/003Textduplikat Windows Management Instrumentation Event Subscription
A-TITLE T1546.003
/techniques/T1546/004Textduplikat Unix Shell Configuration Modification
A-TITLE T1546.004
/techniques/T1546/005Textduplikat Trap
A-TITLE T1546.005
/techniques/T1546/006Textduplikat LC_LOAD_DYLIB Addition
A-TITLE T1546.006
/techniques/T1546/007Textduplikat Netsh Helper DLL
A-TITLE T1546.007
/techniques/T1546/008Textduplikat Accessibility Features
A-TITLE T1546.008
/techniques/T1546/009Textduplikat AppCert DLLs
A-TITLE T1546.009
/techniques/T1546/010Textduplikat AppInit DLLs
A-TITLE T1546.010
/techniques/T1546/011Textduplikat Application Shimming
A-TITLE T1546.011
/techniques/T1546/012Textduplikat Image File Execution Options Injection
A-TITLE T1546.012
/techniques/T1546/013Textduplikat PowerShell Profile
A-TITLE T1546.013
/techniques/T1546/014Textduplikat Emond
A-TITLE T1546.014
/techniques/T1546/015Textduplikat Component Object Model Hijacking
A-TITLE T1546.015
/techniques/T1546/016Textduplikat Installer Packages
A-TITLE T1546.016
/techniques/T1546/017Textduplikat Udev Rules
A-TITLE T1546.017
/techniques/T1668Textduplikat Exclusive Control
A-TITLE T1668
/techniques/T1133Textduplikat External Remote Services
A-TITLE T1133
/techniques/T1574Textduplikat Hijack Execution Flow (12)
A-TITLE T1574
/techniques/T1574/001Textduplikat DLL
A-TITLE T1574.001
/techniques/T1574/004Textduplikat Dylib Hijacking
A-TITLE T1574.004
/techniques/T1574/005Textduplikat Executable Installer File Permissions Weakness
A-TITLE T1574.005
/techniques/T1574/006Textduplikat Dynamic Linker Hijacking
A-TITLE T1574.006
/techniques/T1574/007Textduplikat Path Interception by PATH Environment Variable
A-TITLE T1574.007
/techniques/T1574/008Textduplikat Path Interception by Search Order Hijacking
A-TITLE T1574.008
/techniques/T1574/009Textduplikat Path Interception by Unquoted Path
A-TITLE T1574.009
/techniques/T1574/010Textduplikat Services File Permissions Weakness
A-TITLE T1574.010
/techniques/T1574/011Textduplikat Services Registry Permissions Weakness
A-TITLE T1574.011
/techniques/T1574/012Textduplikat COR_PROFILER
A-TITLE T1574.012
/techniques/T1574/013Textduplikat KernelCallbackTable
A-TITLE T1574.013
/techniques/T1574/014Textduplikat AppDomainManager
A-TITLE T1574.014
/techniques/T1525Textduplikat Implant Internal Image
A-TITLE T1525
/techniques/T1556Textduplikat Modify Authentication Process (9)
A-TITLE T1556
/techniques/T1556/001Textduplikat Domain Controller Authentication
A-TITLE T1556.001
/techniques/T1556/002Textduplikat Password Filter DLL
A-TITLE T1556.002
/techniques/T1556/003Textduplikat Pluggable Authentication Modules
A-TITLE T1556.003
/techniques/T1556/004Textduplikat Network Device Authentication
A-TITLE T1556.004
/techniques/T1556/005Textduplikat Reversible Encryption
A-TITLE T1556.005
/techniques/T1556/006Textduplikat Multi-Factor Authentication
A-TITLE T1556.006
/techniques/T1556/007Textduplikat Hybrid Identity
A-TITLE T1556.007
/techniques/T1556/008Textduplikat Network Provider DLL
A-TITLE T1556.008
/techniques/T1556/009Textduplikat Conditional Access Policies
A-TITLE T1556.009
/techniques/T1112Textduplikat Modify Registry
A-TITLE T1112
/techniques/T1137Textduplikat Office Application Startup (6)
A-TITLE T1137
/techniques/T1137/001Textduplikat Office Template Macros
A-TITLE T1137.001
/techniques/T1137/002Textduplikat Office Test
A-TITLE T1137.002
/techniques/T1137/003Textduplikat Outlook Forms
A-TITLE T1137.003
/techniques/T1137/004Textduplikat Outlook Home Page
A-TITLE T1137.004
/techniques/T1137/005Textduplikat Outlook Rules
A-TITLE T1137.005
/techniques/T1137/006Textduplikat Add-ins
A-TITLE T1137.006
/techniques/T1653Textduplikat Power Settings
A-TITLE T1653
/techniques/T1542Textduplikat Pre-OS Boot (5)
A-TITLE T1542
/techniques/T1542/001Textduplikat System Firmware
A-TITLE T1542.001
/techniques/T1542/002Textduplikat Component Firmware
A-TITLE T1542.002
/techniques/T1542/003Textduplikat Bootkit
A-TITLE T1542.003
/techniques/T1542/004Textduplikat ROMMONkit
A-TITLE T1542.004
/techniques/T1542/005Textduplikat TFTP Boot
A-TITLE T1542.005
/techniques/T1053Textduplikat Scheduled Task/Job (5)
A-TITLE T1053
/techniques/T1053/002Textduplikat At
A-TITLE T1053.002
/techniques/T1053/003Textduplikat Cron
A-TITLE T1053.003
/techniques/T1053/005Textduplikat Scheduled Task
A-TITLE T1053.005
/techniques/T1053/006Textduplikat Systemd Timers
A-TITLE T1053.006
/techniques/T1053/007Textduplikat Container Orchestration Job
A-TITLE T1053.007
/techniques/T1505Textduplikat Server Software Component (6)
A-TITLE T1505
/techniques/T1505/001Textduplikat SQL Stored Procedures
A-TITLE T1505.001
/techniques/T1505/002Textduplikat Transport Agent
A-TITLE T1505.002
/techniques/T1505/003Textduplikat Web Shell
A-TITLE T1505.003
/techniques/T1505/004Textduplikat IIS Components
A-TITLE T1505.004
/techniques/T1505/005Textduplikat Terminal Services DLL
A-TITLE T1505.005
/techniques/T1505/006Textduplikat vSphere Installation Bundles
A-TITLE T1505.006
/techniques/T1176Textduplikat Software Extensions (2)
A-TITLE T1176
/techniques/T1176/001Textduplikat Browser Extensions
A-TITLE T1176.001
/techniques/T1176/002Textduplikat IDE Extensions
A-TITLE T1176.002
/techniques/T1205Textduplikat Traffic Signaling (2)
A-TITLE T1205
/techniques/T1205/001Textduplikat Port Knocking
A-TITLE T1205.001
/techniques/T1205/002Textduplikat Socket Filters
A-TITLE T1205.002
/techniques/T1078Textduplikat Valid Accounts (4)
A-TITLE T1078
/techniques/T1078/001Textduplikat Default Accounts
A-TITLE T1078.001
/techniques/T1078/002Textduplikat Domain Accounts
A-TITLE T1078.002
/techniques/T1078/003Textduplikat Local Accounts
A-TITLE T1078.003
/techniques/T1078/004Textduplikat Cloud Accounts
A-TITLE T1078.004
/techniques/T1548Textduplikat Abuse Elevation Control Mechanism (6)
A-TITLE T1548
/techniques/T1548/001Textduplikat Setuid and Setgid
A-TITLE T1548.001
/techniques/T1548/002Textduplikat Bypass User Account Control
A-TITLE T1548.002
/techniques/T1548/003Textduplikat Sudo and Sudo Caching
A-TITLE T1548.003
/techniques/T1548/004Textduplikat Elevated Execution with Prompt
A-TITLE T1548.004
/techniques/T1548/005Textduplikat Temporary Elevated Cloud Access
A-TITLE T1548.005
/techniques/T1548/006Textduplikat TCC Manipulation
A-TITLE T1548.006
/techniques/T1134Textduplikat Access Token Manipulation (5)
A-TITLE T1134
/techniques/T1134/001Textduplikat Token Impersonation/Theft
A-TITLE T1134.001
/techniques/T1134/002Textduplikat Create Process with Token
A-TITLE T1134.002
/techniques/T1134/003Textduplikat Make and Impersonate Token
A-TITLE T1134.003
/techniques/T1134/004Textduplikat Parent PID Spoofing
A-TITLE T1134.004
/techniques/T1134/005Textduplikat SID-History Injection
A-TITLE T1134.005
/techniques/T1098Textduplikat Account Manipulation (7)
A-TITLE T1098
/techniques/T1098/001Textduplikat Additional Cloud Credentials
A-TITLE T1098.001
/techniques/T1098/002Textduplikat Additional Email Delegate Permissions
A-TITLE T1098.002
/techniques/T1098/003Textduplikat Additional Cloud Roles
A-TITLE T1098.003
/techniques/T1098/004Textduplikat SSH Authorized Keys
A-TITLE T1098.004
/techniques/T1098/005Textduplikat Device Registration
A-TITLE T1098.005
/techniques/T1098/006Textduplikat Additional Container Cluster Roles
A-TITLE T1098.006
/techniques/T1098/007Textduplikat Additional Local or Domain Groups
A-TITLE T1098.007
/techniques/T1547Textduplikat Boot or Logon Autostart Execution (14)
A-TITLE T1547
/techniques/T1547/001Textduplikat Registry Run Keys / Startup Folder
A-TITLE T1547.001
/techniques/T1547/002Textduplikat Authentication Package
A-TITLE T1547.002
/techniques/T1547/003Textduplikat Time Providers
A-TITLE T1547.003
/techniques/T1547/004Textduplikat Winlogon Helper DLL
A-TITLE T1547.004
/techniques/T1547/005Textduplikat Security Support Provider
A-TITLE T1547.005
/techniques/T1547/006Textduplikat Kernel Modules and Extensions
A-TITLE T1547.006
/techniques/T1547/007Textduplikat Re-opened Applications
A-TITLE T1547.007
/techniques/T1547/008Textduplikat LSASS Driver
A-TITLE T1547.008
/techniques/T1547/009Textduplikat Shortcut Modification
A-TITLE T1547.009
/techniques/T1547/010Textduplikat Port Monitors
A-TITLE T1547.010
/techniques/T1547/012Textduplikat Print Processors
A-TITLE T1547.012
/techniques/T1547/013Textduplikat XDG Autostart Entries
A-TITLE T1547.013
/techniques/T1547/014Textduplikat Active Setup
A-TITLE T1547.014
/techniques/T1547/015Textduplikat Login Items
A-TITLE T1547.015
/techniques/T1037Textduplikat Boot or Logon Initialization Scripts (5)
A-TITLE T1037
/techniques/T1037/001Textduplikat Logon Script (Windows)
A-TITLE T1037.001
/techniques/T1037/002Textduplikat Login Hook
A-TITLE T1037.002
/techniques/T1037/003Textduplikat Network Logon Script
A-TITLE T1037.003
/techniques/T1037/004Textduplikat RC Scripts
A-TITLE T1037.004
/techniques/T1037/005Textduplikat Startup Items
A-TITLE T1037.005
/techniques/T1543Textduplikat Create or Modify System Process (5)
A-TITLE T1543
/techniques/T1543/001Textduplikat Launch Agent
A-TITLE T1543.001
/techniques/T1543/002Textduplikat Systemd Service
A-TITLE T1543.002
/techniques/T1543/003Textduplikat Windows Service
A-TITLE T1543.003
/techniques/T1543/004Textduplikat Launch Daemon
A-TITLE T1543.004
/techniques/T1543/005Textduplikat Container Service
A-TITLE T1543.005
/techniques/T1484Textduplikat Domain or Tenant Policy Modification (2)
A-TITLE T1484
/techniques/T1484/001Textduplikat Group Policy Modification
A-TITLE T1484.001
/techniques/T1484/002Textduplikat Trust Modification
A-TITLE T1484.002
/techniques/T1611Textduplikat Escape to Host
A-TITLE T1611
/techniques/T1546Textduplikat Event Triggered Execution (17)
A-TITLE T1546
/techniques/T1546/001Textduplikat Change Default File Association
A-TITLE T1546.001
/techniques/T1546/002Textduplikat Screensaver
A-TITLE T1546.002
/techniques/T1546/003Textduplikat Windows Management Instrumentation Event Subscription
A-TITLE T1546.003
/techniques/T1546/004Textduplikat Unix Shell Configuration Modification
A-TITLE T1546.004
/techniques/T1546/005Textduplikat Trap
A-TITLE T1546.005
/techniques/T1546/006Textduplikat LC_LOAD_DYLIB Addition
A-TITLE T1546.006
/techniques/T1546/007Textduplikat Netsh Helper DLL
A-TITLE T1546.007
/techniques/T1546/008Textduplikat Accessibility Features
A-TITLE T1546.008
/techniques/T1546/009Textduplikat AppCert DLLs
A-TITLE T1546.009
/techniques/T1546/010Textduplikat AppInit DLLs
A-TITLE T1546.010
/techniques/T1546/011Textduplikat Application Shimming
A-TITLE T1546.011
/techniques/T1546/012Textduplikat Image File Execution Options Injection
A-TITLE T1546.012
/techniques/T1546/013Textduplikat PowerShell Profile
A-TITLE T1546.013
/techniques/T1546/014Textduplikat Emond
A-TITLE T1546.014
/techniques/T1546/015Textduplikat Component Object Model Hijacking
A-TITLE T1546.015
/techniques/T1546/016Textduplikat Installer Packages
A-TITLE T1546.016
/techniques/T1546/017Textduplikat Udev Rules
A-TITLE T1546.017
/techniques/T1068Textduplikat Exploitation for Privilege Escalation
A-TITLE T1068
/techniques/T1574Textduplikat Hijack Execution Flow (12)
A-TITLE T1574
/techniques/T1574/001Textduplikat DLL
A-TITLE T1574.001
/techniques/T1574/004Textduplikat Dylib Hijacking
A-TITLE T1574.004
/techniques/T1574/005Textduplikat Executable Installer File Permissions Weakness
A-TITLE T1574.005
/techniques/T1574/006Textduplikat Dynamic Linker Hijacking
A-TITLE T1574.006
/techniques/T1574/007Textduplikat Path Interception by PATH Environment Variable
A-TITLE T1574.007
/techniques/T1574/008Textduplikat Path Interception by Search Order Hijacking
A-TITLE T1574.008
/techniques/T1574/009Textduplikat Path Interception by Unquoted Path
A-TITLE T1574.009
/techniques/T1574/010Textduplikat Services File Permissions Weakness
A-TITLE T1574.010
/techniques/T1574/011Textduplikat Services Registry Permissions Weakness
A-TITLE T1574.011
/techniques/T1574/012Textduplikat COR_PROFILER
A-TITLE T1574.012
/techniques/T1574/013Textduplikat KernelCallbackTable
A-TITLE T1574.013
/techniques/T1574/014Textduplikat AppDomainManager
A-TITLE T1574.014
/techniques/T1055Textduplikat Process Injection (12)
A-TITLE T1055
/techniques/T1055/001Textduplikat Dynamic-link Library Injection
A-TITLE T1055.001
/techniques/T1055/002Textduplikat Portable Executable Injection
A-TITLE T1055.002
/techniques/T1055/003Textduplikat Thread Execution Hijacking
A-TITLE T1055.003
/techniques/T1055/004Textduplikat Asynchronous Procedure Call
A-TITLE T1055.004
/techniques/T1055/005Textduplikat Thread Local Storage
A-TITLE T1055.005
/techniques/T1055/008Textduplikat Ptrace System Calls
A-TITLE T1055.008
/techniques/T1055/009Textduplikat Proc Memory
A-TITLE T1055.009
/techniques/T1055/011Textduplikat Extra Window Memory Injection
A-TITLE T1055.011
/techniques/T1055/012Textduplikat Process Hollowing
A-TITLE T1055.012
/techniques/T1055/013Textduplikat Process Doppelg??nging
A-TITLE T1055.013
/techniques/T1055/014Textduplikat VDSO Hijacking
A-TITLE T1055.014
/techniques/T1055/015Textduplikat ListPlanting
A-TITLE T1055.015
/techniques/T1053Textduplikat Scheduled Task/Job (5)
A-TITLE T1053
/techniques/T1053/002Textduplikat At
A-TITLE T1053.002
/techniques/T1053/003Textduplikat Cron
A-TITLE T1053.003
/techniques/T1053/005Textduplikat Scheduled Task
A-TITLE T1053.005
/techniques/T1053/006Textduplikat Systemd Timers
A-TITLE T1053.006
/techniques/T1053/007Textduplikat Container Orchestration Job
A-TITLE T1053.007
/techniques/T1078Textduplikat Valid Accounts (4)
A-TITLE T1078
/techniques/T1078/001Textduplikat Default Accounts
A-TITLE T1078.001
/techniques/T1078/002Textduplikat Domain Accounts
A-TITLE T1078.002
/techniques/T1078/003Textduplikat Local Accounts
A-TITLE T1078.003
/techniques/T1078/004Textduplikat Cloud Accounts
A-TITLE T1078.004
/techniques/T1548Textduplikat Abuse Elevation Control Mechanism (6)
A-TITLE T1548
/techniques/T1548/001Textduplikat Setuid and Setgid
A-TITLE T1548.001
/techniques/T1548/002Textduplikat Bypass User Account Control
A-TITLE T1548.002
/techniques/T1548/003Textduplikat Sudo and Sudo Caching
A-TITLE T1548.003
/techniques/T1548/004Textduplikat Elevated Execution with Prompt
A-TITLE T1548.004
/techniques/T1548/005Textduplikat Temporary Elevated Cloud Access
A-TITLE T1548.005
/techniques/T1548/006Textduplikat TCC Manipulation
A-TITLE T1548.006
/techniques/T1134Textduplikat Access Token Manipulation (5)
A-TITLE T1134
/techniques/T1134/001Textduplikat Token Impersonation/Theft
A-TITLE T1134.001
/techniques/T1134/002Textduplikat Create Process with Token
A-TITLE T1134.002
/techniques/T1134/003Textduplikat Make and Impersonate Token
A-TITLE T1134.003
/techniques/T1134/004Textduplikat Parent PID Spoofing
A-TITLE T1134.004
/techniques/T1134/005Textduplikat SID-History Injection
A-TITLE T1134.005
/techniques/T1197Textduplikat BITS Jobs
A-TITLE T1197
/techniques/T1612Textduplikat Build Image on Host
A-TITLE T1612
/techniques/T1622Textduplikat Debugger Evasion
A-TITLE T1622
/techniques/T1140Textduplikat Deobfuscate/Decode Files or Information
A-TITLE T1140
/techniques/T1610Textduplikat Deploy Container
A-TITLE T1610
/techniques/T1006Textduplikat Direct Volume Access
A-TITLE T1006
/techniques/T1484Textduplikat Domain or Tenant Policy Modification (2)
A-TITLE T1484
/techniques/T1484/001Textduplikat Group Policy Modification
A-TITLE T1484.001
/techniques/T1484/002Textduplikat Trust Modification
A-TITLE T1484.002
/techniques/T1672Textduplikat Email Spoofing
A-TITLE T1672
/techniques/T1480Textduplikat Execution Guardrails (2)
A-TITLE T1480
/techniques/T1480/001Textduplikat Environmental Keying
A-TITLE T1480.001
/techniques/T1480/002Textduplikat Mutual Exclusion
A-TITLE T1480.002
/techniques/T1211Textduplikat Exploitation for Defense Evasion
A-TITLE T1211
/techniques/T1222Textduplikat File and Directory Permissions Modification (2)
A-TITLE T1222
/techniques/T1222/001Textduplikat Windows File and Directory Permissions Modification
A-TITLE T1222.001
/techniques/T1222/002Textduplikat Linux and Mac File and Directory Permissions Modification
A-TITLE T1222.002
/techniques/T1564Textduplikat Hide Artifacts (14)
A-TITLE T1564
/techniques/T1564/001Textduplikat Hidden Files and Directories
A-TITLE T1564.001
/techniques/T1564/002Textduplikat Hidden Users
A-TITLE T1564.002
/techniques/T1564/003Textduplikat Hidden Window
A-TITLE T1564.003
/techniques/T1564/004Textduplikat NTFS File Attributes
A-TITLE T1564.004
/techniques/T1564/005Textduplikat Hidden File System
A-TITLE T1564.005
/techniques/T1564/006Textduplikat Run Virtual Instance
A-TITLE T1564.006
/techniques/T1564/007Textduplikat VBA Stomping
A-TITLE T1564.007
/techniques/T1564/008Textduplikat Email Hiding Rules
A-TITLE T1564.008
/techniques/T1564/009Textduplikat Resource Forking
A-TITLE T1564.009
/techniques/T1564/010Textduplikat Process Argument Spoofing
A-TITLE T1564.010
/techniques/T1564/011Textduplikat Ignore Process Interrupts
A-TITLE T1564.011
/techniques/T1564/012Textduplikat File/Path Exclusions
A-TITLE T1564.012
/techniques/T1564/013Textduplikat Bind Mounts
A-TITLE T1564.013
/techniques/T1564/014Textduplikat Extended Attributes
A-TITLE T1564.014
/techniques/T1574Textduplikat Hijack Execution Flow (12)
A-TITLE T1574
/techniques/T1574/001Textduplikat DLL
A-TITLE T1574.001
/techniques/T1574/004Textduplikat Dylib Hijacking
A-TITLE T1574.004
/techniques/T1574/005Textduplikat Executable Installer File Permissions Weakness
A-TITLE T1574.005
/techniques/T1574/006Textduplikat Dynamic Linker Hijacking
A-TITLE T1574.006
/techniques/T1574/007Textduplikat Path Interception by PATH Environment Variable
A-TITLE T1574.007
/techniques/T1574/008Textduplikat Path Interception by Search Order Hijacking
A-TITLE T1574.008
/techniques/T1574/009Textduplikat Path Interception by Unquoted Path
A-TITLE T1574.009
/techniques/T1574/010Textduplikat Services File Permissions Weakness
A-TITLE T1574.010
/techniques/T1574/011Textduplikat Services Registry Permissions Weakness
A-TITLE T1574.011
/techniques/T1574/012Textduplikat COR_PROFILER
A-TITLE T1574.012
/techniques/T1574/013Textduplikat KernelCallbackTable
A-TITLE T1574.013
/techniques/T1574/014Textduplikat AppDomainManager
A-TITLE T1574.014
/techniques/T1562Textduplikat Impair Defenses (11)
A-TITLE T1562
/techniques/T1562/001Textduplikat Disable or Modify Tools
A-TITLE T1562.001
/techniques/T1562/002Textduplikat Disable Windows Event Logging
A-TITLE T1562.002
/techniques/T1562/003Textduplikat Impair Command History Logging
A-TITLE T1562.003
/techniques/T1562/004Textduplikat Disable or Modify System Firewall
A-TITLE T1562.004
/techniques/T1562/006Textduplikat Indicator Blocking
A-TITLE T1562.006
/techniques/T1562/007Textduplikat Disable or Modify Cloud Firewall
A-TITLE T1562.007
/techniques/T1562/008Textduplikat Disable or Modify Cloud Logs
A-TITLE T1562.008
/techniques/T1562/009Textduplikat Safe Mode Boot
A-TITLE T1562.009
/techniques/T1562/010Textduplikat Downgrade Attack
A-TITLE T1562.010
/techniques/T1562/011Textduplikat Spoof Security Alerting
A-TITLE T1562.011
/techniques/T1562/012Textduplikat Disable or Modify Linux Audit System
A-TITLE T1562.012
/techniques/T1656Textduplikat Impersonation
A-TITLE T1656
/techniques/T1070Textduplikat Indicator Removal (10)
A-TITLE T1070
/techniques/T1070/001Textduplikat Clear Windows Event Logs
A-TITLE T1070.001
/techniques/T1070/002Textduplikat Clear Linux or Mac System Logs
A-TITLE T1070.002
/techniques/T1070/003Textduplikat Clear Command History
A-TITLE T1070.003
/techniques/T1070/004Textduplikat File Deletion
A-TITLE T1070.004
/techniques/T1070/005Textduplikat Network Share Connection Removal
A-TITLE T1070.005
/techniques/T1070/006Textduplikat Timestomp
A-TITLE T1070.006
/techniques/T1070/007Textduplikat Clear Network Connection History and Configurations
A-TITLE T1070.007
/techniques/T1070/008Textduplikat Clear Mailbox Data
A-TITLE T1070.008
/techniques/T1070/009Textduplikat Clear Persistence
A-TITLE T1070.009
/techniques/T1070/010Textduplikat Relocate Malware
A-TITLE T1070.010
/techniques/T1202Textduplikat Indirect Command Execution
A-TITLE T1202
/techniques/T1036Textduplikat Masquerading (11)
A-TITLE T1036
/techniques/T1036/001Textduplikat Invalid Code Signature
A-TITLE T1036.001
/techniques/T1036/002Textduplikat Right-to-Left Override
A-TITLE T1036.002
/techniques/T1036/003Textduplikat Rename Legitimate Utilities
A-TITLE T1036.003
/techniques/T1036/004Textduplikat Masquerade Task or Service
A-TITLE T1036.004
/techniques/T1036/005Textduplikat Match Legitimate Resource Name or Location
A-TITLE T1036.005
/techniques/T1036/006Textduplikat Space after Filename
A-TITLE T1036.006
/techniques/T1036/007Textduplikat Double File Extension
A-TITLE T1036.007
/techniques/T1036/008Textduplikat Masquerade File Type
A-TITLE T1036.008
/techniques/T1036/009Textduplikat Break Process Trees
A-TITLE T1036.009
/techniques/T1036/010Textduplikat Masquerade Account Name
A-TITLE T1036.010
/techniques/T1036/011Textduplikat Overwrite Process Arguments
A-TITLE T1036.011
/techniques/T1556Textduplikat Modify Authentication Process (9)
A-TITLE T1556
/techniques/T1556/001Textduplikat Domain Controller Authentication
A-TITLE T1556.001
/techniques/T1556/002Textduplikat Password Filter DLL
A-TITLE T1556.002
/techniques/T1556/003Textduplikat Pluggable Authentication Modules
A-TITLE T1556.003
/techniques/T1556/004Textduplikat Network Device Authentication
A-TITLE T1556.004
/techniques/T1556/005Textduplikat Reversible Encryption
A-TITLE T1556.005
/techniques/T1556/006Textduplikat Multi-Factor Authentication
A-TITLE T1556.006
/techniques/T1556/007Textduplikat Hybrid Identity
A-TITLE T1556.007
/techniques/T1556/008Textduplikat Network Provider DLL
A-TITLE T1556.008
/techniques/T1556/009Textduplikat Conditional Access Policies
A-TITLE T1556.009
/techniques/T1578Textduplikat Modify Cloud Compute Infrastructure (5)
A-TITLE T1578
/techniques/T1578/001Textduplikat Create Snapshot
A-TITLE T1578.001
/techniques/T1578/002Textduplikat Create Cloud Instance
A-TITLE T1578.002
/techniques/T1578/003Textduplikat Delete Cloud Instance
A-TITLE T1578.003
/techniques/T1578/004Textduplikat Revert Cloud Instance
A-TITLE T1578.004
/techniques/T1578/005Textduplikat Modify Cloud Compute Configurations
A-TITLE T1578.005
/techniques/T1666Textduplikat Modify Cloud Resource Hierarchy
A-TITLE T1666
/techniques/T1112Textduplikat Modify Registry
A-TITLE T1112
/techniques/T1601Textduplikat Modify System Image (2)
A-TITLE T1601
/techniques/T1601/001Textduplikat Patch System Image
A-TITLE T1601.001
/techniques/T1601/002Textduplikat Downgrade System Image
A-TITLE T1601.002
/techniques/T1599Textduplikat Network Boundary Bridging (1)
A-TITLE T1599
/techniques/T1599/001Textduplikat Network Address Translation Traversal
A-TITLE T1599.001
/techniques/T1027Textduplikat Obfuscated Files or Information (17)
A-TITLE T1027
/techniques/T1027/001Textduplikat Binary Padding
A-TITLE T1027.001
/techniques/T1027/002Textduplikat Software Packing
A-TITLE T1027.002
/techniques/T1027/003Textduplikat Steganography
A-TITLE T1027.003
/techniques/T1027/004Textduplikat Compile After Delivery
A-TITLE T1027.004
/techniques/T1027/005Textduplikat Indicator Removal from Tools
A-TITLE T1027.005
/techniques/T1027/006Textduplikat HTML Smuggling
A-TITLE T1027.006
/techniques/T1027/007Textduplikat Dynamic API Resolution
A-TITLE T1027.007
/techniques/T1027/008Textduplikat Stripped Payloads
A-TITLE T1027.008
/techniques/T1027/009Textduplikat Embedded Payloads
A-TITLE T1027.009
/techniques/T1027/010Textduplikat Command Obfuscation
A-TITLE T1027.010
/techniques/T1027/011Textduplikat Fileless Storage
A-TITLE T1027.011
/techniques/T1027/012Textduplikat LNK Icon Smuggling
A-TITLE T1027.012
/techniques/T1027/013Textduplikat Encrypted/Encoded File
A-TITLE T1027.013
/techniques/T1027/014Textduplikat Polymorphic Code
A-TITLE T1027.014
/techniques/T1027/015Textduplikat Compression
A-TITLE T1027.015
/techniques/T1027/016Textduplikat Junk Code Insertion
A-TITLE T1027.016
/techniques/T1027/017Textduplikat SVG Smuggling
A-TITLE T1027.017
/techniques/T1647Textduplikat Plist File Modification
A-TITLE T1647
/techniques/T1542Textduplikat Pre-OS Boot (5)
A-TITLE T1542
/techniques/T1542/001Textduplikat System Firmware
A-TITLE T1542.001
/techniques/T1542/002Textduplikat Component Firmware
A-TITLE T1542.002
/techniques/T1542/003Textduplikat Bootkit
A-TITLE T1542.003
/techniques/T1542/004Textduplikat ROMMONkit
A-TITLE T1542.004
/techniques/T1542/005Textduplikat TFTP Boot
A-TITLE T1542.005
/techniques/T1055Textduplikat Process Injection (12)
A-TITLE T1055
/techniques/T1055/001Textduplikat Dynamic-link Library Injection
A-TITLE T1055.001
/techniques/T1055/002Textduplikat Portable Executable Injection
A-TITLE T1055.002
/techniques/T1055/003Textduplikat Thread Execution Hijacking
A-TITLE T1055.003
/techniques/T1055/004Textduplikat Asynchronous Procedure Call
A-TITLE T1055.004
/techniques/T1055/005Textduplikat Thread Local Storage
A-TITLE T1055.005
/techniques/T1055/008Textduplikat Ptrace System Calls
A-TITLE T1055.008
/techniques/T1055/009Textduplikat Proc Memory
A-TITLE T1055.009
/techniques/T1055/011Textduplikat Extra Window Memory Injection
A-TITLE T1055.011
/techniques/T1055/012Textduplikat Process Hollowing
A-TITLE T1055.012
/techniques/T1055/013Textduplikat Process Doppelg??nging
A-TITLE T1055.013
/techniques/T1055/014Textduplikat VDSO Hijacking
A-TITLE T1055.014
/techniques/T1055/015Textduplikat ListPlanting
A-TITLE T1055.015
/techniques/T1620Textduplikat Reflective Code Loading
A-TITLE T1620
/techniques/T1207Textduplikat Rogue Domain Controller
A-TITLE T1207
/techniques/T1014Textduplikat Rootkit
A-TITLE T1014
/techniques/T1553Textduplikat Subvert Trust Controls (6)
A-TITLE T1553
/techniques/T1553/001Textduplikat Gatekeeper Bypass
A-TITLE T1553.001
/techniques/T1553/002Textduplikat Code Signing
A-TITLE T1553.002
/techniques/T1553/003Textduplikat SIP and Trust Provider Hijacking
A-TITLE T1553.003
/techniques/T1553/004Textduplikat Install Root Certificate
A-TITLE T1553.004
/techniques/T1553/005Textduplikat Mark-of-the-Web Bypass
A-TITLE T1553.005
/techniques/T1553/006Textduplikat Code Signing Policy Modification
A-TITLE T1553.006
/techniques/T1218Textduplikat System Binary Proxy Execution (14)
A-TITLE T1218
/techniques/T1218/001Textduplikat Compiled HTML File
A-TITLE T1218.001
/techniques/T1218/002Textduplikat Control Panel
A-TITLE T1218.002
/techniques/T1218/003Textduplikat CMSTP
A-TITLE T1218.003
/techniques/T1218/004Textduplikat InstallUtil
A-TITLE T1218.004
/techniques/T1218/005Textduplikat Mshta
A-TITLE T1218.005
/techniques/T1218/007Textduplikat Msiexec
A-TITLE T1218.007
/techniques/T1218/008Textduplikat Odbcconf
A-TITLE T1218.008
/techniques/T1218/009Textduplikat Regsvcs/Regasm
A-TITLE T1218.009
/techniques/T1218/010Textduplikat Regsvr32
A-TITLE T1218.010
/techniques/T1218/011Textduplikat Rundll32
A-TITLE T1218.011
/techniques/T1218/012Textduplikat Verclsid
A-TITLE T1218.012
/techniques/T1218/013Textduplikat Mavinject
A-TITLE T1218.013
/techniques/T1218/014Textduplikat MMC
A-TITLE T1218.014
/techniques/T1218/015Textduplikat Electron Applications
A-TITLE T1218.015
/techniques/T1216Textduplikat System Script Proxy Execution (2)
A-TITLE T1216
/techniques/T1216/001Textduplikat PubPrn
A-TITLE T1216.001
/techniques/T1216/002Textduplikat SyncAppvPublishingServer
A-TITLE T1216.002
/techniques/T1221Textduplikat Template Injection
A-TITLE T1221
/techniques/T1205Textduplikat Traffic Signaling (2)
A-TITLE T1205
/techniques/T1205/001Textduplikat Port Knocking
A-TITLE T1205.001
/techniques/T1205/002Textduplikat Socket Filters
A-TITLE T1205.002
/techniques/T1127Textduplikat Trusted Developer Utilities Proxy Execution (3)
A-TITLE T1127
/techniques/T1127/001Textduplikat MSBuild
A-TITLE T1127.001
/techniques/T1127/002Textduplikat ClickOnce
A-TITLE T1127.002
/techniques/T1127/003Textduplikat JamPlus
A-TITLE T1127.003
/techniques/T1535Textduplikat Unused/Unsupported Cloud Regions
A-TITLE T1535
/techniques/T1550Textduplikat Use Alternate Authentication Material (4)
A-TITLE T1550
/techniques/T1550/001Textduplikat Application Access Token
A-TITLE T1550.001
/techniques/T1550/002Textduplikat Pass the Hash
A-TITLE T1550.002
/techniques/T1550/003Textduplikat Pass the Ticket
A-TITLE T1550.003
/techniques/T1550/004Textduplikat Web Session Cookie
A-TITLE T1550.004
/techniques/T1078Textduplikat Valid Accounts (4)
A-TITLE T1078
/techniques/T1078/001Textduplikat Default Accounts
A-TITLE T1078.001
/techniques/T1078/002Textduplikat Domain Accounts
A-TITLE T1078.002
/techniques/T1078/003Textduplikat Local Accounts
A-TITLE T1078.003
/techniques/T1078/004Textduplikat Cloud Accounts
A-TITLE T1078.004
/techniques/T1497Textduplikat Virtualization/Sandbox Evasion (3)
A-TITLE T1497
/techniques/T1497/001Textduplikat System Checks
A-TITLE T1497.001
/techniques/T1497/002Textduplikat User Activity Based Checks
A-TITLE T1497.002
/techniques/T1497/003Textduplikat Time Based Evasion
A-TITLE T1497.003
/techniques/T1600Textduplikat Weaken Encryption (2)
A-TITLE T1600
/techniques/T1600/001Textduplikat Reduce Key Space
A-TITLE T1600.001
/techniques/T1600/002Textduplikat Disable Crypto Hardware
A-TITLE T1600.002
/techniques/T1220Textduplikat XSL Script Processing
A-TITLE T1220
/techniques/T1557Textduplikat Adversary-in-the-Middle (4)
A-TITLE T1557
/techniques/T1557/001Textduplikat LLMNR/NBT-NS Poisoning and SMB Relay
A-TITLE T1557.001
/techniques/T1557/002Textduplikat ARP Cache Poisoning
A-TITLE T1557.002
/techniques/T1557/003Textduplikat DHCP Spoofing
A-TITLE T1557.003
/techniques/T1557/004Textduplikat Evil Twin
A-TITLE T1557.004
/techniques/T1110Textduplikat Brute Force (4)
A-TITLE T1110
/techniques/T1110/001Textduplikat Password Guessing
A-TITLE T1110.001
/techniques/T1110/002Textduplikat Password Cracking
A-TITLE T1110.002
/techniques/T1110/003Textduplikat Password Spraying
A-TITLE T1110.003
/techniques/T1110/004Textduplikat Credential Stuffing
A-TITLE T1110.004
/techniques/T1555Textduplikat Credentials from Password Stores (6)
A-TITLE T1555
/techniques/T1555/001Textduplikat Keychain
A-TITLE T1555.001
/techniques/T1555/002Textduplikat Securityd Memory
A-TITLE T1555.002
/techniques/T1555/003Textduplikat Credentials from Web Browsers
A-TITLE T1555.003
/techniques/T1555/004Textduplikat Windows Credential Manager
A-TITLE T1555.004
/techniques/T1555/005Textduplikat Password Managers
A-TITLE T1555.005
/techniques/T1555/006Textduplikat Cloud Secrets Management Stores
A-TITLE T1555.006
/techniques/T1212Textduplikat Exploitation for Credential Access
A-TITLE T1212
/techniques/T1187Textduplikat Forced Authentication
A-TITLE T1187
/techniques/T1606Textduplikat Forge Web Credentials (2)
A-TITLE T1606
/techniques/T1606/001Textduplikat Web Cookies
A-TITLE T1606.001
/techniques/T1606/002Textduplikat SAML Tokens
A-TITLE T1606.002
/techniques/T1056Textduplikat Input Capture (4)
A-TITLE T1056
/techniques/T1056/001Textduplikat Keylogging
A-TITLE T1056.001
/techniques/T1056/002Textduplikat GUI Input Capture
A-TITLE T1056.002
/techniques/T1056/003Textduplikat Web Portal Capture
A-TITLE T1056.003
/techniques/T1056/004Textduplikat Credential API Hooking
A-TITLE T1056.004
/techniques/T1556Textduplikat Modify Authentication Process (9)
A-TITLE T1556
/techniques/T1556/001Textduplikat Domain Controller Authentication
A-TITLE T1556.001
/techniques/T1556/002Textduplikat Password Filter DLL
A-TITLE T1556.002
/techniques/T1556/003Textduplikat Pluggable Authentication Modules
A-TITLE T1556.003
/techniques/T1556/004Textduplikat Network Device Authentication
A-TITLE T1556.004
/techniques/T1556/005Textduplikat Reversible Encryption
A-TITLE T1556.005
/techniques/T1556/006Textduplikat Multi-Factor Authentication
A-TITLE T1556.006
/techniques/T1556/007Textduplikat Hybrid Identity
A-TITLE T1556.007
/techniques/T1556/008Textduplikat Network Provider DLL
A-TITLE T1556.008
/techniques/T1556/009Textduplikat Conditional Access Policies
A-TITLE T1556.009
/techniques/T1111Textduplikat Multi-Factor Authentication Interception
A-TITLE T1111
/techniques/T1621Textduplikat Multi-Factor Authentication Request Generation
A-TITLE T1621
/techniques/T1040Textduplikat Network Sniffing
A-TITLE T1040
/techniques/T1003Textduplikat OS Credential Dumping (8)
A-TITLE T1003
/techniques/T1003/001Textduplikat LSASS Memory
A-TITLE T1003.001
/techniques/T1003/002Textduplikat Security Account Manager
A-TITLE T1003.002
/techniques/T1003/003Textduplikat NTDS
A-TITLE T1003.003
/techniques/T1003/004Textduplikat LSA Secrets
A-TITLE T1003.004
/techniques/T1003/005Textduplikat Cached Domain Credentials
A-TITLE T1003.005
/techniques/T1003/006Textduplikat DCSync
A-TITLE T1003.006
/techniques/T1003/007Textduplikat Proc Filesystem
A-TITLE T1003.007
/techniques/T1003/008Textduplikat /etc/passwd and /etc/shadow
A-TITLE T1003.008
/techniques/T1528Textduplikat Steal Application Access Token
A-TITLE T1528
/techniques/T1649Textduplikat Steal or Forge Authentication Certificates
A-TITLE T1649
/techniques/T1558Textduplikat Steal or Forge Kerberos Tickets (5)
A-TITLE T1558
/techniques/T1558/001Textduplikat Golden Ticket
A-TITLE T1558.001
/techniques/T1558/002Textduplikat Silver Ticket
A-TITLE T1558.002
/techniques/T1558/003Textduplikat Kerberoasting
A-TITLE T1558.003
/techniques/T1558/004Textduplikat AS-REP Roasting
A-TITLE T1558.004
/techniques/T1558/005Textduplikat Ccache Files
A-TITLE T1558.005
/techniques/T1539Textduplikat Steal Web Session Cookie
A-TITLE T1539
/techniques/T1552Textduplikat Unsecured Credentials (8)
A-TITLE T1552
/techniques/T1552/001Textduplikat Credentials In Files
A-TITLE T1552.001
/techniques/T1552/002Textduplikat Credentials in Registry
A-TITLE T1552.002
/techniques/T1552/003Textduplikat Bash History
A-TITLE T1552.003
/techniques/T1552/004Textduplikat Private Keys
A-TITLE T1552.004
/techniques/T1552/005Textduplikat Cloud Instance Metadata API
A-TITLE T1552.005
/techniques/T1552/006Textduplikat Group Policy Preferences
A-TITLE T1552.006
/techniques/T1552/007Textduplikat Container API
A-TITLE T1552.007
/techniques/T1552/008Textduplikat Chat Messages
A-TITLE T1552.008
/techniques/T1087Textduplikat Account Discovery (4)
A-TITLE T1087
/techniques/T1087/001Textduplikat Local Account
A-TITLE T1087.001
/techniques/T1087/002Textduplikat Domain Account
A-TITLE T1087.002
/techniques/T1087/003Textduplikat Email Account
A-TITLE T1087.003
/techniques/T1087/004Textduplikat Cloud Account
A-TITLE T1087.004
/techniques/T1010Textduplikat Application Window Discovery
A-TITLE T1010
/techniques/T1217Textduplikat Browser Information Discovery
A-TITLE T1217
/techniques/T1580Textduplikat Cloud Infrastructure Discovery
A-TITLE T1580
/techniques/T1538Textduplikat Cloud Service Dashboard
A-TITLE T1538
/techniques/T1526Textduplikat Cloud Service Discovery
A-TITLE T1526
/techniques/T1619Textduplikat Cloud Storage Object Discovery
A-TITLE T1619
/techniques/T1613Textduplikat Container and Resource Discovery
A-TITLE T1613
/techniques/T1622Textduplikat Debugger Evasion
A-TITLE T1622
/techniques/T1652Textduplikat Device Driver Discovery
A-TITLE T1652
/techniques/T1482Textduplikat Domain Trust Discovery
A-TITLE T1482
/techniques/T1083Textduplikat File and Directory Discovery
A-TITLE T1083
/techniques/T1615Textduplikat Group Policy Discovery
A-TITLE T1615
/techniques/T1654Textduplikat Log Enumeration
A-TITLE T1654
/techniques/T1046Textduplikat Network Service Discovery
A-TITLE T1046
/techniques/T1135Textduplikat Network Share Discovery
A-TITLE T1135
/techniques/T1040Textduplikat Network Sniffing
A-TITLE T1040
/techniques/T1201Textduplikat Password Policy Discovery
A-TITLE T1201
/techniques/T1120Textduplikat Peripheral Device Discovery
A-TITLE T1120
/techniques/T1069Textduplikat Permission Groups Discovery (3)
A-TITLE T1069
/techniques/T1069/001Textduplikat Local Groups
A-TITLE T1069.001
/techniques/T1069/002Textduplikat Domain Groups
A-TITLE T1069.002
/techniques/T1069/003Textduplikat Cloud Groups
A-TITLE T1069.003
/techniques/T1057Textduplikat Process Discovery
A-TITLE T1057
/techniques/T1012Textduplikat Query Registry
A-TITLE T1012
/techniques/T1018Textduplikat Remote System Discovery
A-TITLE T1018
/techniques/T1518Textduplikat Software Discovery (1)
A-TITLE T1518
/techniques/T1518/001Textduplikat Security Software Discovery
A-TITLE T1518.001
/techniques/T1082Textduplikat System Information Discovery
A-TITLE T1082
/techniques/T1614Textduplikat System Location Discovery (1)
A-TITLE T1614
/techniques/T1614/001Textduplikat System Language Discovery
A-TITLE T1614.001
/techniques/T1016Textduplikat System Network Configuration Discovery (2)
A-TITLE T1016
/techniques/T1016/001Textduplikat Internet Connection Discovery
A-TITLE T1016.001
/techniques/T1016/002Textduplikat Wi-Fi Discovery
A-TITLE T1016.002
/techniques/T1049Textduplikat System Network Connections Discovery
A-TITLE T1049
/techniques/T1033Textduplikat System Owner/User Discovery
A-TITLE T1033
/techniques/T1007Textduplikat System Service Discovery
A-TITLE T1007
/techniques/T1124Textduplikat System Time Discovery
A-TITLE T1124
/techniques/T1673Textduplikat Virtual Machine Discovery
A-TITLE T1673
/techniques/T1497Textduplikat Virtualization/Sandbox Evasion (3)
A-TITLE T1497
/techniques/T1497/001Textduplikat System Checks
A-TITLE T1497.001
/techniques/T1497/002Textduplikat User Activity Based Checks
A-TITLE T1497.002
/techniques/T1497/003Textduplikat Time Based Evasion
A-TITLE T1497.003
/techniques/T1210Textduplikat Exploitation of Remote Services
A-TITLE T1210
/techniques/T1534Textduplikat Internal Spearphishing
A-TITLE T1534
/techniques/T1570Textduplikat Lateral Tool Transfer
A-TITLE T1570
/techniques/T1563Textduplikat Remote Service Session Hijacking (2)
A-TITLE T1563
/techniques/T1563/001Textduplikat SSH Hijacking
A-TITLE T1563.001
/techniques/T1563/002Textduplikat RDP Hijacking
A-TITLE T1563.002
/techniques/T1021Textduplikat Remote Services (8)
A-TITLE T1021
/techniques/T1021/001Textduplikat Remote Desktop Protocol
A-TITLE T1021.001
/techniques/T1021/002Textduplikat SMB/Windows Admin Shares
A-TITLE T1021.002
/techniques/T1021/003Textduplikat Distributed Component Object Model
A-TITLE T1021.003
/techniques/T1021/004Textduplikat SSH
A-TITLE T1021.004
/techniques/T1021/005Textduplikat VNC
A-TITLE T1021.005
/techniques/T1021/006Textduplikat Windows Remote Management
A-TITLE T1021.006
/techniques/T1021/007Textduplikat Cloud Services
A-TITLE T1021.007
/techniques/T1021/008Textduplikat Direct Cloud VM Connections
A-TITLE T1021.008
/techniques/T1091Textduplikat Replication Through Removable Media
A-TITLE T1091
/techniques/T1072Textduplikat Software Deployment Tools
A-TITLE T1072
/techniques/T1080Textduplikat Taint Shared Content
A-TITLE T1080
/techniques/T1550Textduplikat Use Alternate Authentication Material (4)
A-TITLE T1550
/techniques/T1550/001Textduplikat Application Access Token
A-TITLE T1550.001
/techniques/T1550/002Textduplikat Pass the Hash
A-TITLE T1550.002
/techniques/T1550/003Textduplikat Pass the Ticket
A-TITLE T1550.003
/techniques/T1550/004Textduplikat Web Session Cookie
A-TITLE T1550.004
/techniques/T1557Textduplikat Adversary-in-the-Middle (4)
A-TITLE T1557
/techniques/T1557/001Textduplikat LLMNR/NBT-NS Poisoning and SMB Relay
A-TITLE T1557.001
/techniques/T1557/002Textduplikat ARP Cache Poisoning
A-TITLE T1557.002
/techniques/T1557/003Textduplikat DHCP Spoofing
A-TITLE T1557.003
/techniques/T1557/004Textduplikat Evil Twin
A-TITLE T1557.004
/techniques/T1560Textduplikat Archive Collected Data (3)
A-TITLE T1560
/techniques/T1560/001Textduplikat Archive via Utility
A-TITLE T1560.001
/techniques/T1560/002Textduplikat Archive via Library
A-TITLE T1560.002
/techniques/T1560/003Textduplikat Archive via Custom Method
A-TITLE T1560.003
/techniques/T1123Textduplikat Audio Capture
A-TITLE T1123
/techniques/T1119Textduplikat Automated Collection
A-TITLE T1119
/techniques/T1185Textduplikat Browser Session Hijacking
A-TITLE T1185
/techniques/T1115Textduplikat Clipboard Data
A-TITLE T1115
/techniques/T1530Textduplikat Data from Cloud Storage
A-TITLE T1530
/techniques/T1602Textduplikat Data from Configuration Repository (2)
A-TITLE T1602
/techniques/T1602/001Textduplikat SNMP (MIB Dump)
A-TITLE T1602.001
/techniques/T1602/002Textduplikat Network Device Configuration Dump
A-TITLE T1602.002
/techniques/T1213Textduplikat Data from Information Repositories (5)
A-TITLE T1213
/techniques/T1213/001Textduplikat Confluence
A-TITLE T1213.001
/techniques/T1213/002Textduplikat Sharepoint
A-TITLE T1213.002
/techniques/T1213/003Textduplikat Code Repositories
A-TITLE T1213.003
/techniques/T1213/004Textduplikat Customer Relationship Management Software
A-TITLE T1213.004
/techniques/T1213/005Textduplikat Messaging Applications
A-TITLE T1213.005
/techniques/T1005Textduplikat Data from Local System
A-TITLE T1005
/techniques/T1039Textduplikat Data from Network Shared Drive
A-TITLE T1039
/techniques/T1025Textduplikat Data from Removable Media
A-TITLE T1025
/techniques/T1074Textduplikat Data Staged (2)
A-TITLE T1074
/techniques/T1074/001Textduplikat Local Data Staging
A-TITLE T1074.001
/techniques/T1074/002Textduplikat Remote Data Staging
A-TITLE T1074.002
/techniques/T1114Textduplikat Email Collection (3)
A-TITLE T1114
/techniques/T1114/001Textduplikat Local Email Collection
A-TITLE T1114.001
/techniques/T1114/002Textduplikat Remote Email Collection
A-TITLE T1114.002
/techniques/T1114/003Textduplikat Email Forwarding Rule
A-TITLE T1114.003
/techniques/T1056Textduplikat Input Capture (4)
A-TITLE T1056
/techniques/T1056/001Textduplikat Keylogging
A-TITLE T1056.001
/techniques/T1056/002Textduplikat GUI Input Capture
A-TITLE T1056.002
/techniques/T1056/003Textduplikat Web Portal Capture
A-TITLE T1056.003
/techniques/T1056/004Textduplikat Credential API Hooking
A-TITLE T1056.004
/techniques/T1113Textduplikat Screen Capture
A-TITLE T1113
/techniques/T1125Textduplikat Video Capture
A-TITLE T1125
/techniques/T1071Textduplikat Application Layer Protocol (5)
A-TITLE T1071
/techniques/T1071/001Textduplikat Web Protocols
A-TITLE T1071.001
/techniques/T1071/002Textduplikat File Transfer Protocols
A-TITLE T1071.002
/techniques/T1071/003Textduplikat Mail Protocols
A-TITLE T1071.003
/techniques/T1071/004Textduplikat DNS
A-TITLE T1071.004
/techniques/T1071/005Textduplikat Publish/Subscribe Protocols
A-TITLE T1071.005
/techniques/T1092Textduplikat Communication Through Removable Media
A-TITLE T1092
/techniques/T1659Textduplikat Content Injection
A-TITLE T1659
/techniques/T1132Textduplikat Data Encoding (2)
A-TITLE T1132
/techniques/T1132/001Textduplikat Standard Encoding
A-TITLE T1132.001
/techniques/T1132/002Textduplikat Non-Standard Encoding
A-TITLE T1132.002
/techniques/T1001Textduplikat Data Obfuscation (3)
A-TITLE T1001
/techniques/T1001/001Textduplikat Junk Data
A-TITLE T1001.001
/techniques/T1001/002Textduplikat Steganography
A-TITLE T1001.002
/techniques/T1001/003Textduplikat Protocol or Service Impersonation
A-TITLE T1001.003
/techniques/T1568Textduplikat Dynamic Resolution (3)
A-TITLE T1568
/techniques/T1568/001Textduplikat Fast Flux DNS
A-TITLE T1568.001
/techniques/T1568/002Textduplikat Domain Generation Algorithms
A-TITLE T1568.002
/techniques/T1568/003Textduplikat DNS Calculation
A-TITLE T1568.003
/techniques/T1573Textduplikat Encrypted Channel (2)
A-TITLE T1573
/techniques/T1573/001Textduplikat Symmetric Cryptography
A-TITLE T1573.001
/techniques/T1573/002Textduplikat Asymmetric Cryptography
A-TITLE T1573.002
/techniques/T1008Textduplikat Fallback Channels
A-TITLE T1008
/techniques/T1665Textduplikat Hide Infrastructure
A-TITLE T1665
/techniques/T1105Textduplikat Ingress Tool Transfer
A-TITLE T1105
/techniques/T1104Textduplikat Multi-Stage Channels
A-TITLE T1104
/techniques/T1095Textduplikat Non-Application Layer Protocol
A-TITLE T1095
/techniques/T1571Textduplikat Non-Standard Port
A-TITLE T1571
/techniques/T1572Textduplikat Protocol Tunneling
A-TITLE T1572
/techniques/T1090Textduplikat Proxy (4)
A-TITLE T1090
/techniques/T1090/001Textduplikat Internal Proxy
A-TITLE T1090.001
/techniques/T1090/002Textduplikat External Proxy
A-TITLE T1090.002
/techniques/T1090/003Textduplikat Multi-hop Proxy
A-TITLE T1090.003
/techniques/T1090/004Textduplikat Domain Fronting
A-TITLE T1090.004
/techniques/T1219Textduplikat Remote Access Tools (3)
A-TITLE T1219
/techniques/T1219/001Textduplikat IDE Tunneling
A-TITLE T1219.001
/techniques/T1219/002Textduplikat Remote Desktop Software
A-TITLE T1219.002
/techniques/T1219/003Textduplikat Remote Access Hardware
A-TITLE T1219.003
/techniques/T1205Textduplikat Traffic Signaling (2)
A-TITLE T1205
/techniques/T1205/001Textduplikat Port Knocking
A-TITLE T1205.001
/techniques/T1205/002Textduplikat Socket Filters
A-TITLE T1205.002
/techniques/T1102Textduplikat Web Service (3)
A-TITLE T1102
/techniques/T1102/001Textduplikat Dead Drop Resolver
A-TITLE T1102.001
/techniques/T1102/002Textduplikat Bidirectional Communication
A-TITLE T1102.002
/techniques/T1102/003Textduplikat One-Way Communication
A-TITLE T1102.003
/techniques/T1020Textduplikat Automated Exfiltration (1)
A-TITLE T1020
/techniques/T1020/001Textduplikat Traffic Duplication
A-TITLE T1020.001
/techniques/T1030Textduplikat Data Transfer Size Limits
A-TITLE T1030
/techniques/T1048Textduplikat Exfiltration Over Alternative Protocol (3)
A-TITLE T1048
/techniques/T1048/001Textduplikat Exfiltration Over Symmetric Encrypted Non-C2 Protocol
A-TITLE T1048.001
/techniques/T1048/002Textduplikat Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
A-TITLE T1048.002
/techniques/T1048/003Textduplikat Exfiltration Over Unencrypted Non-C2 Protocol
A-TITLE T1048.003
/techniques/T1041Textduplikat Exfiltration Over C2 Channel
A-TITLE T1041
/techniques/T1011Textduplikat Exfiltration Over Other Network Medium (1)
A-TITLE T1011
/techniques/T1011/001Textduplikat Exfiltration Over Bluetooth
A-TITLE T1011.001
/techniques/T1052Textduplikat Exfiltration Over Physical Medium (1)
A-TITLE T1052
/techniques/T1052/001Textduplikat Exfiltration over USB
A-TITLE T1052.001
/techniques/T1567Textduplikat Exfiltration Over Web Service (4)
A-TITLE T1567
/techniques/T1567/001Textduplikat Exfiltration to Code Repository
A-TITLE T1567.001
/techniques/T1567/002Textduplikat Exfiltration to Cloud Storage
A-TITLE T1567.002
/techniques/T1567/003Textduplikat Exfiltration to Text Storage Sites
A-TITLE T1567.003
/techniques/T1567/004Textduplikat Exfiltration Over Webhook
A-TITLE T1567.004
/techniques/T1029Textduplikat Scheduled Transfer
A-TITLE T1029
/techniques/T1537Textduplikat Transfer Data to Cloud Account
A-TITLE T1537
/techniques/T1531Textduplikat Account Access Removal
A-TITLE T1531
/techniques/T1485Textduplikat Data Destruction (1)
A-TITLE T1485
/techniques/T1485/001Textduplikat Lifecycle-Triggered Deletion
A-TITLE T1485.001
/techniques/T1486Textduplikat Data Encrypted for Impact
A-TITLE T1486
/techniques/T1565Textduplikat Data Manipulation (3)
A-TITLE T1565
/techniques/T1565/001Textduplikat Stored Data Manipulation
A-TITLE T1565.001
/techniques/T1565/002Textduplikat Transmitted Data Manipulation
A-TITLE T1565.002
/techniques/T1565/003Textduplikat Runtime Data Manipulation
A-TITLE T1565.003
/techniques/T1491Textduplikat Defacement (2)
A-TITLE T1491
/techniques/T1491/001Textduplikat Internal Defacement
A-TITLE T1491.001
/techniques/T1491/002Textduplikat External Defacement
A-TITLE T1491.002
/techniques/T1561Textduplikat Disk Wipe (2)
A-TITLE T1561
/techniques/T1561/001Textduplikat Disk Content Wipe
A-TITLE T1561.001
/techniques/T1561/002Textduplikat Disk Structure Wipe
A-TITLE T1561.002
/techniques/T1667Textduplikat Email Bombing
A-TITLE T1667
/techniques/T1499Textduplikat Endpoint Denial of Service (4)
A-TITLE T1499
/techniques/T1499/001Textduplikat OS Exhaustion Flood
A-TITLE T1499.001
/techniques/T1499/002Textduplikat Service Exhaustion Flood
A-TITLE T1499.002
/techniques/T1499/003Textduplikat Application Exhaustion Flood
A-TITLE T1499.003
/techniques/T1499/004Textduplikat Application or System Exploitation
A-TITLE T1499.004
/techniques/T1657Textduplikat Financial Theft
A-TITLE T1657
/techniques/T1495Textduplikat Firmware Corruption
A-TITLE T1495
/techniques/T1490Textduplikat Inhibit System Recovery
A-TITLE T1490
/techniques/T1498Textduplikat Network Denial of Service (2)
A-TITLE T1498
/techniques/T1498/001Textduplikat Direct Network Flood
A-TITLE T1498.001
/techniques/T1498/002Textduplikat Reflection Amplification
A-TITLE T1498.002
/techniques/T1496Textduplikat Resource Hijacking (4)
A-TITLE T1496
/techniques/T1496/001Textduplikat Compute Hijacking
A-TITLE T1496.001
/techniques/T1496/002Textduplikat Bandwidth Hijacking
A-TITLE T1496.002
/techniques/T1496/003Textduplikat SMS Pumping
A-TITLE T1496.003
/techniques/T1496/004Textduplikat Cloud Service Hijacking
A-TITLE T1496.004
/techniques/T1489Textduplikat Service Stop
A-TITLE T1489
/techniques/T1529Textduplikat System Shutdown/Reboot
A-TITLE T1529
https://www.mitre.org/Neues Fenster Extern Subdomain Kein Text
/resources/engage-with-attack/...Contact Us
/resources/legal-and-branding/...Terms of Use
/resources/legal-and-branding/...Privacy Policy
/resources/changelog.htmlWebsite Changelog
A-TITLE ATT&CK content v17.1 Website v4.2.3
/resources/legal-and-branding/...Cookie Preferences
https://twitter.com/MITREattackExtern Kein Text
https://github.com/mitre-attackExtern Kein Text

Serverkonfiguration

HTTP-Weiterleitungen
(Extrem wichtig)
Die Seite leitet weiter auf "https://attack.mitre.org/"
HTTP-Header
(Wichtig)
Es wird kein X-Powered HTTP-Header mitgesendet.
Der Webserver überträgt die Webseite (HTML) komprimiert.
Performance
(Wenig wichtig)
Die Antwortzeit der HTML-Seite ist mit 0,56 Sekunden länger als die empfohlene Zeit von maximal 0,4 Sekunden. Eine hohe Antwortzeit verlängert unnötig das Crawling und sorgt für eine schlechte User Experience.
Die Größe des HTML-Dokuments ist mit 1.459 kB sehr groß.

HTTP-Header

NameWert
serverGitHub.com
content-typetext/html; charset=utf-8
last-modifiedWed, 02 Jul 2025 17:48:10 GMT
access-control-allow-origin*
etagW/"686570da-16c9f9"
expiresSat, 26 Jul 2025 19:51:44 GMT
cache-controlmax-age=600
content-encodinggzip
x-proxy-cacheMISS
x-github-request-id4E53:2E592A:2417463:24538DC:68852F78
accept-rangesbytes
age0
dateSat, 26 Jul 2025 19:41:44 GMT
via1.1 varnish
x-served-bycache-fra-eddf8230164-FRA
x-cacheMISS
x-cache-hits0
x-timerS1753558905.657801,VS0,VE162
varyAccept-Encoding
x-fastly-request-idbd2b42a1d36a9bd37c192263a6612efdbf4256c6
content-length112126
statuscode200
http_versionHTTP/2

Externe Faktoren

Die Seite wird von Wikipedia verlinkt.
Die Seite ist exzellent von anderen Webseiten verlinkt.
Die Seite hat Backlinks von 3.821 verweisenden Domains.
Die Seite hat insgesamt 63.442 Backlinks.
Die Seite hat Backlinks von 2.783 verschiedenen IP Adressen.

Suchvorschau

attack.mitre.org
MITRE ATT&CK®

Wichtigste Suchbegriffe

Folgende Keywords wurden erkannt. Überprüfe die Optimierung dieser Keywords für Deine Seite.

KeywordErgebnisPrüfen
MITRE59%Check
or Modify45%Check
Files or45%Check
or Service45%Check
Boot or Logon41%Check
or Modify System41%Check
Disable or Modify41%Check
Techniques39%Check
Resource39%Check
Disable or Modify Cloud39%Check

Analysiere attack.mitre.org jetzt automatisch und vollständig mit allen Unterseiten!

Jetzt kostenlos testen
Garantiert keine Kosten während der Testphase.

Cookie Einstellungen

Wir verwenden Cookies, damit unsere Website funktioniert und auch für Analyse- und Werbezwecke. Du kannst optionale Cookies selbstverständlich auch deaktivieren, siehe die folgenden Links für weitere Informationen.

Diese Cookies werden für grundlegende Websitefunktionen benötigt.

Damit wir besser verstehen, wie Besucher unsere Website nutzen.

Damit wir für Dich passgenaue Angebote bereitstellen können.