
Techniques - Enterprise | MITRE ATT&CK®
Techniques represent 'how' an adversary achieves a tactical goal by performing an action. For example, an adversary may dump credentials to achieve credential access.
MITRE ATT&CK®
MITRE ATT&CK ® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the …
Enterprise tactics - MITRE ATT&CK®
Enterprise tactics Tactics represent the "why" of an ATT&CK technique or sub-technique. It is the adversary's tactical goal: the reason for performing an action. For example, an adversary may want …
Initial Access, Tactic TA0001 - Enterprise | MITRE ATT&CK®
Oct 17, 2018 · Initial Access consists of techniques that use various entry vectors to gain their initial foothold within a network. Techniques used to gain a foothold include targeted spearphishing and …
Enterprise Matrix - MITRE ATT&CK®
Below are the tactics and techniques representing the MITRE ATT&CK ® Matrix for Enterprise. The Matrix contains information for the following platforms: Windows, macOS, Linux, PRE, Office Suite, …
Get Started | MITRE ATT&CK®
What is ATT&CK? ATT&CK is knowledge base of adversarial techniques based on real-world observations. ATT&CK focuses on how adversaries interact with systems during an operation, …
Valid Accounts, Technique T1078 - Enterprise | MITRE ATT&CK®
Oct 24, 2018 · Sub-techniques (4) Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Techniques - ICS | MITRE ATT&CK®
Techniques represent 'how' an adversary achieves a tactical goal by performing an action. For example, an adversary may dump credentials to achieve credential access.
Privilege Escalation, Tactic TA0004 - MITRE ATT&CK®
Oct 17, 2018 · Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with …
FAQ | MITRE ATT&CK®
What are "techniques"? Techniques represent “how” an adversary achieves a tactical goal by performing an action. For example, an adversary may dump credentials to achieve credential access.