About 11,500 results
Open links in new tab
  1. Techniques - Enterprise | MITRE ATT&CK®

    Techniques represent 'how' an adversary achieves a tactical goal by performing an action. For example, an adversary may dump credentials to achieve credential access.

  2. MITRE ATT&CK®

    MITRE ATT&CK ® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the …

  3. Enterprise tactics - MITRE ATT&CK®

    Enterprise tactics Tactics represent the "why" of an ATT&CK technique or sub-technique. It is the adversary's tactical goal: the reason for performing an action. For example, an adversary may want …

  4. Initial Access, Tactic TA0001 - Enterprise | MITRE ATT&CK®

    Oct 17, 2018 · Initial Access consists of techniques that use various entry vectors to gain their initial foothold within a network. Techniques used to gain a foothold include targeted spearphishing and …

  5. Enterprise Matrix - MITRE ATT&CK®

    Below are the tactics and techniques representing the MITRE ATT&CK ® Matrix for Enterprise. The Matrix contains information for the following platforms: Windows, macOS, Linux, PRE, Office Suite, …

  6. Get Started | MITRE ATT&CK®

    What is ATT&CK? ATT&CK is knowledge base of adversarial techniques based on real-world observations. ATT&CK focuses on how adversaries interact with systems during an operation, …

  7. Valid Accounts, Technique T1078 - Enterprise | MITRE ATT&CK®

    Oct 24, 2018 · Sub-techniques (4) Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.

  8. Techniques - ICS | MITRE ATT&CK®

    Techniques represent 'how' an adversary achieves a tactical goal by performing an action. For example, an adversary may dump credentials to achieve credential access.

  9. Privilege Escalation, Tactic TA0004 - MITRE ATT&CK®

    Oct 17, 2018 · Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with …

  10. FAQ | MITRE ATT&CK®

    What are "techniques"? Techniques represent “how” an adversary achieves a tactical goal by performing an action. For example, an adversary may dump credentials to achieve credential access.