MITRE ATT&CK Wheel of Fortune
MITRE ATT&CK Wheel of Fortune
MITRE ATT&CK Wheel of Fortune
org/techniques/enterprise/
255 46 122
Instructions
Spinning the wheel:
MS Office/Libre Office: Click on any cell and press delete (e.g. the red cell below), or press F9
OpenOffice: Press CTRL + SHIFT + F9
The numbers above will change. Move over to any of the technique tabs and select the row which corresponds to the rolle
number. If you've already completed it, revise or roll again.
Follow the link and read about the technique, see if you can recreate it in a lab environment, come up with detection metho
document, or otherwise experiment with it until you feel confident you know it, then mark it as completed.
If it is too difficult, mark it down in Areas for Improvement and return at a later date. As you progress keep count of how m
you've done and reward yourself in the Achievements section, feel free to tailor this as you see fit, it is meant to be a learning
and isn't restricted.
0.2
w), or press F9
tre.org/resources/terms-of-use/
ID Name
T1067 Bootkit
T1217 Browser Bookmark Discovery
T1191 CMSTP
T1519 Emond
T1148 HISTCONTROL
T1179 Hooking
T1062 Hypervisor
T1183 Image File Execution Options Injection
T1118 InstallUtil
T1208 Kerberoasting
T1142 Keychain
T1152 Launchctl
T1161 LC_LOAD_DYLIB Addition
T1086 PowerShell
T1504 PowerShell Profile
T1145 Private Keys
T1057 Process Discovery
T1014 Rootkit
T1085 Rundll32
T1180 Screensaver
T1064 Scripting
T1063 Security Software Discovery
T1153 Source
T1169 Sudo
Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate u
Adversaries may attempt to get a listing of local system or domain accounts.
Account manipulation may aid adversaries in maintaining access to credentials and certain permission levels within an environ
permission groups, modifying account settings, or modifying how authentication is performed. These actions could also includ
subvert password duration policies and preserve the life of compromised credentials. In order to create or manipulate accoun
Dynamic-link libraries (DLLs) that are specified in the AppCertDLLs Registry key under HKEY_LOCAL_MACHINE\System\Curr
application programming interface (API) functions CreateProcess, CreateProcessAsUser, CreateProcessWithLoginW, CreatePro
Dynamic-link libraries (DLLs) that are specified in the AppInit_DLLs value in the Registry keys HKEY_LOCAL_MACHINE\Software
macOS and OS X applications send AppleEvent messages to each other for interprocess communications (IPC). These message
Open Scripting Architecture (OSA) language scripts. A list of OSA languages installed on a system can be found by using the os
Adversaries may use application access tokens to bypass the typical authentication process and access restricted accounts, inf
credentials.
Adversaries may deploy malicious software to systems within a network using application deployment systems employed by e
may be sufficient with direct access to the deployment server, or specific domain credentials may be required. However, the s
The Microsoft Windows Application Compatibility Infrastructure/Framework (Application Shim) was created to allow for backw
Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how th
An adversary can leverage a computer's peripheral devices (e.g., microphones and webcams) or applications (e.g., voice and v
information.
Windows Authentication Package DLLs are loaded by the Local Security Authority (LSA) process at system start. They provide s
Once established within a system or network, an adversary may use automated techniques for collecting internal data. Metho
Data, such as sensitive documents, may be exfiltrated through the use of automated processing or Scripting after being gather
Bash keeps track of the commands users type on the command-line with the "history" utility. Once a user logs out, the history
~/.bash_history. Typically, this file keeps track of the user’s last 500 commands. Users often type usernames and passwords
can abuse this by looking through the file for potential credentials.
Adversaries can use binary padding to add junk data and change the on-disk representation of malware without affecting the
tools are capable of handling due to file size limitations.
Windows Background Intelligent Transfer Service (BITS) is a low-bandwidth, asynchronous file transfer mechanism exposed th
preferred to operate in the background (using available idle bandwidth) without interrupting other networked applications. Fi
A bootkit is a malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) and Vol
Adversaries may enumerate browser bookmarks to learn more about compromised hosts. Browser bookmarks may reveal per
network resources such as servers, tools/dashboards, or other related infrastructure.
Browser extensions or plugins are small programs that can add functionality and customize aspects of internet browsers. They
everything that the browser can access.
Adversaries may use brute force techniques to attempt access to accounts when passwords are unknown or when password h
Windows User Account Control (UAC) allows a program to elevate its privileges to perform a task under administrator-level pe
under high enforcement to allowing the user to perform the action if they are in the local administrators group and click throu
When a file is opened, the default program used to open the file (also called the file association or handler) is checked. File ass
that have Registry access or by administrators using the built-in assoc utility. Applications can modify the file association for a
macOS and Linux both keep track of the commands users type in their terminal so that users can easily remember what they'v
file pointed to by the environment variable HISTFILE. When a user logs off a system, this information is flushed to a file in the
they've used before in different sessions. Since everything typed on the command-line is saved, passwords passed in on the co
Additionally, adversaries can use a variety of methods to prevent their own commands from appear in these logs such as uns
Adversaries may collect data stored in the Windows clipboard from users copying information within or between applications.
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
An adversary may use a cloud service dashboard GUI with stolen credentials to gain useful information from an operational clo
be used to view all assets, findings of potential security risks, and to run additional queries, such as finding public IP addresses
An adversary may attempt to enumerate the cloud services running on a system after gaining access. These methods can diffe
(SaaS). Many different services exist throughout the various cloud providers and can include continuous integration and contin
the services enabled throughout the environment.
The Microsoft Connection Manager Profile Installer (CMSTP.exe) is a command-line program used to install Connection Manag
profile leveraged for remote access connections.
Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tam
as legitimate binaries . The certificates used during an operation may be created, forged, or stolen by the adversary.
Command-line interfaces provide a way of interacting with computer systems and is a common feature across many types of o
used to perform a number of tasks including execution of other software. Command-line interfaces can be interacted with loc
with the current permission level of the command-line interface process unless the command includes process invocation tha
Adversaries may communicate over a commonly used port to bypass firewalls or network detection systems and to blend with
Adversaries can perform command and control between compromised hosts on potentially disconnected networks using rem
Adversaries may attempt to make payloads difficult to discover and analyze by delivering files to victims as uncompiled code. S
Compiled HTML files (.chm) are commonly distributed as part of the Microsoft HTML Help system. CHM files are compressed c
languages such VBA, JScript, Java, and ActiveX. CHM content is displayed using underlying components of the Internet Explore
Some adversaries may employ sophisticated means to compromise computer components and install malicious firmware that
Adversaries may use the Windows Component Object Model (COM) and Distributed Component Object Model (DCOM) for loc
The Component Object Model (COM) is a system within Windows to enable interaction between software components throug
of legitimate software through hijacking the COM references and relationships as a means for persistence. Hijacking a COM ob
may cause that component to not work when executed. When that system component is executed through normal system op
frequently enough to maintain a consistent level of persistence, but are unlikely to break noticeable functionality within the sy
Adversaries may use a connection proxy to direct network traffic between systems or act as an intermediary for network comm
Windows Control Panel items are utilities that allow users to view and adjust computer settings. Control Panel items are regist
that export a CPlApplet function. Control Panel items can be executed directly from the command line, programmatically via a
Adversaries with a sufficient level of access may create a local system, domain, or cloud tenant account. Such accounts may be
Credential dumping is the process of obtaining account login and password information, normally in the form of a hash or a cle
Movement and access restricted information.
Adversaries may acquire credentials from web browsers by reading files specific to the target browser.
Adversaries may search local file systems and remote file shares for files containing passwords. These can be files created by u
containing passwords for a system or service, or source code/binary files containing embedded passwords.
The Windows Registry stores configuration information that can be used by the system or other programs. Adversaries may qu
services. Sometimes these credentials are used for automatic logons.
Adversaries may communicate using a custom command and control protocol instead of encapsulating commands/data in an
Adversaries may use a custom cryptographic protocol or algorithm to hide command and control traffic. A simple scheme, suc
An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable a
exfiltration channel and is performed using a custom program or algorithm, or a more common compression library or utility s
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to system
techniques through overwriting files or data on local and remote drives. Common operating system file deletion commands su
the files recoverable by proper forensic methodology. This behavior is distinct from Disk Content Wipe and Disk Structure Wip
Command and control (C2) information is encoded using a standard data encoding system. Use of data encoding may be to ad
binary-to-text and character encoding systems. Some data encoding systems may also result in data compression, such as gzip
Data is encrypted before being exfiltrated in order to hide the information that is being exfiltrated from detection or to make
programming library, or custom algorithm on the data itself and is considered separate from any encryption performed by the
zip.
Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system
and remote drives and withholding access to a decryption key. This may be done in order to extract monetary compensation f
inaccessible in cases where the key is not saved or transmitted. In the case of ransomware, it is typical that common user files
adversaries may encrypt critical system files, disk partitions, and the MBR.
Adversaries may access data objects from improperly secured cloud storage.
Adversaries may leverage information repositories to mine valuable information. Information repositories are tools that allow
store a wide variety of data that may aid adversaries in further objectives, or direct access to the target information.
Sensitive data can be collected from local system sources, such as the file system or databases of information residing on the s
Sensitive data can be collected from remote systems via shared network drives (host shared directory, network file server, etc
Sensitive data can be collected from any removable media (optical disk drive, USB memory, etc.) connected to the compromis
Command and control (C2) communications are hidden (but not necessarily encrypted) in an attempt to make the content mo
being seen. This encompasses many methods, such as adding junk data to protocol traffic, using steganography, commingling
modified Base64 encoding for the message body of an HTTP request.
Collected data is staged in a central location or directory prior to Exfiltration. Data may be kept in separate files or combined in
An adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds. This a
DCShadow is a method of manipulating Active Directory (AD) data, including objects and schemas, by registering (or reusing a
be able to inject and replicate changes into AD infrastructure for any domain object, including credentials and keys.
Adversaries may modify visual content available internally or externally to an enterprise network. Reasons for Defacement inc
Adversaries may use Obfuscated Files or Information to hide artifacts of an intrusion from analysis. They may require separate
doing that include built-in functionality of malware, Scripting, PowerShell, or by using utilities present on the system.
Adversaries may disable security tools to avoid possible detection of their tools and activities. This can take the form of killing
other methods to interfere with security scanning or event reporting.
Adversaries may erase the contents of storage devices on specific systems as well as large numbers of systems in a network to
Adversaries may corrupt or wipe the disk data structures on hard drive necessary to boot systems; targeting specific critical sy
resources.
Windows systems use a common method to look for required DLLs to load into a program. Adversaries may take advantage of
persistence.
Programs may specify DLLs that are loaded at runtime. Programs that improperly or vaguely specify a required DLL may be op
Windows Side-by-Side (WinSxS) manifests are not explicit enough about characteristics of the DLL to be loaded. Adversaries m
Domain fronting takes advantage of routing schemes in Content Delivery Networks (CDNs) and other services which host multi
technique involves using different domain names in the SNI field of the TLS header and the Host field of the HTTP header. If bo
after unwrapping the TLS header. A variation of the the technique, "domainless" fronting, utilizes a SNI field that is left blank; t
match (if the blank SNI fields are ignored).
Adversaries may make use of Domain Generation Algorithms (DGAs) to dynamically identify a destination for command and co
much harder for defenders block, track, or take over the command and control channel, as there potentially could be thousan
Adversaries may attempt to gather information on domain trust relationships that may be used to identify Lateral Movement
to allow access to resources based on the authentication procedures of another domain. Domain trusts allow the users of the
conduct SID-History Injection, Pass the Ticket, and Kerberoasting. Domain trusts can be enumerated using the DSEnumerateD
adversaries to enumerate domain trusts.
A drive-by compromise is when an adversary gains access to a system through a user visiting a website over the normal course
may also use compromised websites for non-exploitation behavior such as acquiring application access tokens.
macOS and OS X use a common method to look for required dynamic libraries (dylib) to load into a program based on search p
persistence.
Windows Dynamic Data Exchange (DDE) is a client-server protocol for one-time and/or continuous inter-process communicati
consisting of strings, warm data links (notifications when a data item changes), hot data links (duplications of changes to a dat
Adversaries may leverage the AuthorizationExecuteWithPrivileges API to escalate privileges by prompting the user for credenti
privileges, such as for application installation or updating. This API does not validate that the program requesting root privilege
functions in the latest releases of macOS. When calling this API, the user will be prompted to enter their credentials but no ch
files which can be modified to perform malicious behavior with elevated privileges.
Adversaries may target user email to collect sensitive information from a target.
Adversaries may use Event Monitor Daemon (emond) to establish persistence by scheduling malicious commands to run on pr
through a simple rules engine, and takes action. The emond binary at /sbin/emond will load any rules from the /etc/emond.
format and define the name, event type, and action to take. Some examples of event types include system startup and user au
launch if there is no file present in the QueueDirectories path /private/var/db/emondClients, specified in the Launch Daemo
Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users. End
system to cause a persistent crash condition. Example services include websites, email services, DNS, and web-based applicati
malicious activities, including distraction, hacktivism, and extortion.
Execution guardrails constrain execution or actions based on adversary supplied environment specific conditions that are expe
Adversary tools may directly use the Windows application programming interface (API) to execute binaries. Functions such as
argument parameters.
The Windows module loader can be instructed to load DLLs from arbitrary local paths and arbitrary Universal Naming Conventi
called from functions like CreateProcess(), LoadLibrary(), etc. of the Win32 API.
Data exfiltration is performed with a different protocol from the main command and control protocol or channel. The data is l
include FTP, SMTP, HTTP/S, DNS, SMB, or any other network protocol not being used as the main command and control chann
Data exfiltration is performed over the Command and Control channel. Data is encoded into the normal communications chan
Exfiltration could occur over a different network medium than the command and control channel. If the command and contro
modem, cellular data connection, Bluetooth, or another radio frequency (RF) channel. Adversaries could choose to do this if th
primary Internet-connected channel because it is not routed through the same enterprise network.
In certain circumstances, such as an air-gapped network compromise, exfiltration could occur via a physical medium or device
other removable storage and processing device. The physical medium or device could be used as the final exfiltration point or
The use of software, data, or commands to take advantage of a weakness in an Internet-facing computer system or program in
Vulnerabilities can exist in software due to unsecure coding practices that can lead to unanticipated behavior. Adversaries can
execution. Oftentimes the most valuable exploits to an offensive toolkit are those that can be used to obtain code execution o
to the applications they commonly used to do work, so they are a useful target for exploit research and development because
Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, servic
and authentication mechanisms may be targeted for exploitation by adversaries as a means to gain access to useful credential
and can be used to forge Kerberos tickets using domain user permissions. Exploitation for credential access may also result in
Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, servic
may exist in defensive security software that can be used to disable or circumvent them.
Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, servic
constructs such as permission levels will often hinder access to information and use of certain techniques, so adversaries will l
restrictions.
Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, servic
for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system.
Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network reso
Before creating a window, graphical Windows-based processes must prescribe to or register a windows class, which stipulate
Registration of new windows classes can include a request for up to 40 bytes of extra window memory (EWM) to be appended
window and has specific application programming interface (API) functions to set and get its value.
Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in or
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain infor
File and directory permissions are commonly managed by discretionary access control lists (DACLs) specified by the file or dire
which users/groups can perform which actions (ex: read, write, execute, etc.).
Malware, tools, or other non-native files dropped or created on a system by an adversary may leave traces behind as to what
their footprint low or remove them at the end as part of the post-intrusion cleanup process.
Windows allows programs to have direct access to logical volumes. Programs with direct access may read and write files direc
as well as file system monitoring tools.
Processes may automatically execute specific binaries as part of their functionality or to perform other actions. If the permissi
then the target binary may be overwritten with another binary using user-level permissions and executed by the original proce
also execute under higher-level permissions, which could include SYSTEM.
Adversaries may overwrite or corrupt the flash memory contents of system BIOS or other firmware in devices attached to a sy
from non-volatile memory on hardware devices in order to initialize and manage device functionality. These devices could incl
The Server Message Block (SMB) protocol is commonly used in Windows networks for authentication and communication bet
resource it will automatically attempt to authenticate and send credential information for the current user to the remote syste
network resources. Web Distributed Authoring and Versioning (WebDAV) is typically used by Windows systems as a backup pr
80 and 443.
In macOS and OS X, when applications or programs are downloaded from the internet, there is a special attribute set on the fi
time and provides a prompt to the user to allow or deny execution.
The Graphical User Interfaces (GUI) is a common way to interact with an operating system. Adversaries may use a system's GU
instead of through a Command-Line Interface, to search for information and execute files via mouse double-click events, the W
Adversaries may modify Group Policy Objects (GPOs) to subvert the intended discretionary access controls for a domain, usua
Adversaries may introduce computer accessories, computers, or networking hardware into a system or network that can be u
testers leverage hardware additions for initial access. Commercial and open source products are leveraged with capabilities su
reading via DMA , adding new wireless access to an existing network , and others.
To prevent normal users from accidentally changing special files on a system, most operating systems have the concept of a ‘h
commands on the command line. Users must explicitly ask to show the hidden files either via a series of Graphical User Interfa
Every user account in macOS has a userID associated with it. When creating a user, you can specify the userID for that accoun
Adversaries may implement hidden windows to conceal malicious activity from the plain sight of users. In some cases, window
utilized by system administrators to avoid disrupting user work environments when carrying out administrative tasks. Adversa
user to adversary activity on the system.
The HISTCONTROL environment variable keeps track of what should be saved by the history command and eventually into
a space by simply setting it to "ignorespace". HISTCONTROL can also be set to ignore duplicate commands by setting it to "ig
examples. This means that “ ls” will not be saved, but “ls” would be saved by history. HISTCONTROL does not exist by defaul
traces by simply prepending a space to all of their terminal commands.
Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable s
functions.
A type-1 hypervisor is a software layer that sits between the guest operating systems and system's hardware. It presents a virt
Image File Execution Options (IFEO) enable a developer to attach a debugger to an application. When a process is created, a d
new process under the debugger (e.g., “C:\dbg\ntsd.exe -g notepad.exe”).
Amazon Web Service (AWS) Amazon Machine Images (AMI), Google Cloud Platform (GCP) Images, and Azure Images as well as
Depending on how the infrastructure is provisioned, this could provide persistent access if the infrastructure provisioning tool
An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. This
(ETW), by tampering settings that control the collection and flow of event telemetry. These settings may be stored on the syst
PowerShell or Windows Management Instrumentation.
If a malicious tool is detected and quarantined or otherwise curtailed, an adversary may be able to determine why the malicio
that is no longer detected by the target's defensive systems or subsequent targets that may use similar systems.
Adversaries may delete or alter generated artifacts on a host system, including logs and potentially captured files such as quar
Various Windows utilities may be used to execute commands, possibly without invoking cmd. For example, Forfiles, the Progra
utilities may invoke the execution of programs and commands from a Command-Line Interface, Run window, or via scripts.
Adversaries may delete or remove built-in operating system data and turn off services designed to aid in the recovery of a corr
such as a backup catalog, volume shadow copies, and automatic repair features. Adversaries may disable or delete system rec
Adversaries can use methods of capturing user input for obtaining credentials for Valid Accounts and information Collection th
When programs are executed that need additional privileges than are present in the current user context, it is common for the
Root certificates are used in public key cryptography to identify a root certificate authority (CA). When a root certificate is inst
root certificate. Certificates are commonly used for establishing secure TLS/SSL communications within a web browser. When
displayed to warn the user of the security risk. Depending on the security settings, the browser may not allow the user to esta
InstallUtil is a command-line utility that allows for installation and uninstallation of resources by executing specific installer com
C:\Windows\Microsoft.NET\Framework\v\InstallUtil.exe and C:\Windows\Microsoft.NET\Framework64\v\InstallUtil.e
Adversaries may use internal spearphishing to gain access to additional information or exploit other users within the same org
is multi-staged attack where an email account is owned either by controlling the user's device with previously installed malwa
internal account to increase the likelihood of tricking the target into falling for the phish attempt.
Service principal names (SPNs) are used to uniquely identify each instance of a Windows service. To enable authentication, Ke
with running a service ).
Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They ex
Keychains are the built-in way for macOS to keep track of users' passwords and credentials for many services and features suc
~/Library/Keychains/,/Library/Keychains/, and /Network/Library/Keychains/. The security command-line utility, which
Per Apple’s developer documentation, when a user logs in, a per-user launchd process is started which loads the parameters f
/System/Library/LaunchAgents, /Library/LaunchAgents, and $HOME/Library/LaunchAgents . These launch agents hav
Per Apple’s developer documentation, when macOS and OS X boot up, launchd is run to finish system initialization. This proce
found in /System/Library/LaunchDaemons and /Library/LaunchDaemons . These LaunchDaemons have property list file
Launchctl controls the macOS launchd process which handles things like launch agents and launch daemons, but can execute
interactively, or even redirected from standard input. By loading or reloading launch agents or launch daemons, adversaries ca
launchctl submit -l -- /Path/to/thing/to/execute "arg" "arg" "arg". Loading, unloading, or reloading launch agents or laun
Mach-O binaries have a series of headers that are used to perform certain operations when a binary is loaded. The LC_LOAD_
time. These can be added ad-hoc to the compiled binary as long adjustments are made to the rest of the fields and dependenc
binaries because the binary is being modified. Adversaries can remediate this issue by simply removing the LC_CODE_SIGNATU
As of OS X 10.8, mach-O binaries introduced a new header called LC_MAIN that points to the binary’s entry point for execution
point for a binary can be hijacked so that initial execution flows to a malicious addition (either another section or a code cave)
modifying a binary in this way, application whitelisting can be bypassed because the file name or application path is still the sa
Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that
and allows hosts on the same local link to perform name resolution for other hosts. NBT-NS identifies systems on a local netw
On Linux and macOS systems, multiple methods are supported for creating pre-scheduled and periodic background jobs: cron
MacOS provides the option to list specific applications to run when a user logs in. These applications run under the logged in u
Windows allows logon scripts to be run whenever a specific user or group of users log into a system. The scripts can be used to
logging server.
The Windows security subsystem is a set of components that manage and enforce the security policy for a computer or doma
authentication. The LSA includes multiple dynamic link libraries (DLLs) associated with various other security functions, all of w
Adversaries can take advantage of security vulnerabilities and inherent functionality in browser software to change content, m
Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sa
Windows service configuration information, including the file path to the service's executable or recovery programs/command
Adversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove informatio
Mshta.exe is a utility that executes Microsoft HTML Applications (HTA). HTA files have the file extension .hta. HTAs are standa
browser.
To disguise the source of malicious traffic, adversaries may chain together multiple proxies. Typically, a defender will be able t
identify any previous proxies before the last-hop proxy. This technique makes identifying the original source of the malicious t
its source.
Adversaries may create multiple stages for command and control that are employed under different conditions or for certain f
difficult.
Some adversaries may split communications between different protocols. There could be one protocol for inbound command
be random to simply avoid data threshold alerts on any one communication.
An adversary performs C2 communications using multiple layers of encryption, typically (but not exclusively) tunneling a custo
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a
registered netsh.exe helper DLLs are entered into the Windows Registry at HKLM\SOFTWARE\Microsoft\Netsh.
Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resources to
include specific websites, email services, DNS, and web-based applications. Adversaries have been observed conducting netwo
and extortion.
Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remot
tools that are brought onto a system.
Windows shared drive and Windows Admin Shares connections can be removed when no longer needed. Net is an example u
command.
Networks often contain shared network drives and folders that enable users to access file directories on various systems acros
Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wire
transit over the network, or use span ports to capture a larger amount of data.
When operating systems boot up, they can start programs or applications called services that perform background system fun
Windows Registry.
Every New Technology File System (NTFS) formatted partition contains a Master File Table (MFT) that maintains a record for e
Data [known as Alternate Data Streams (ADSs) when more than one Data attribute is present], that can be used to store arbitr
Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise o
platforms and the network to evade defenses.
Microsoft Office is a fairly common application suite on Windows-based operating systems within an enterprise network. Ther
started.
Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to eleva
specified. One way of explicitly assigning the PPID of a new process is via the CreateProcess API call, which supports a param
(UAC) to correctly set the PPID after a requested elevated process is spawned by SYSTEM (typically via svchost.exe or conse
Pass the hash (PtH) is a method of authenticating as a user without having access to the user's cleartext password. This metho
the authentication that uses the password hash. In this technique, valid password hashes for the account being used are captu
authenticated, PtH may be used to perform actions on local or remote systems.
Pass the ticket (PtT) is a method of authenticating to a system using Kerberos tickets without having access to an account's pa
Windows password filters are password policy enforcement mechanisms for both domain and local accounts. Filters are imple
policies. Filter DLLs can be positioned on local computers for local accounts and/or domain controllers for domain accounts.
Password policies for networks are a way to enforce complex passwords that are difficult to guess or crack through Brute Forc
Path interception occurs when an executable is placed in a specific path so that it is executed by an application instead of the
Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer
may be used for further actions.
Adversaries may attempt to find local system or domain-level groups and permissions settings.
Property list (plist) files contain all of the information that macOS and OS X uses to configure applications and services. These fi
when programs should execute, file paths to the executables, program arguments, required OS permissions, and many others
with elevated privileges) and ~/Library/Preferences (which execute with a user's privileges).
Port Knocking is a well-established method used by both defenders and adversaries to hide open ports from access. To enable
Usually this series of packets consists of attempted connections to a predefined sequence of closed ports, but can involve unu
often accomplished by the host based firewall, but could also be implemented by custom software.
A port monitor can be set through the API call to set a DLL to be loaded at startup. This DLL can be located in C:\Windows\Sy
under SYSTEM level permissions. Alternatively, an arbitrary DLL can be loaded if permissions allow writing a fully-qualified pat
PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating sy
execution of code. Examples include the Start-Process cmdlet which can be used to run an executable and the Invoke-Comma
Adversaries may gain persistence and elevate privileges in certain situations by abusing PowerShell profiles. A PowerShell profi
Private cryptographic keys and certificates are used for authentication, encryption/decryption, and digital signatures.
Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain
Windows Transactional NTFS (TxF) was introduced in Vista as a method to perform safe file operations. To ensure data integri
terminated, all other handles are isolated from the writer and may only read the committed version of the file that existed at t
application fails during a write transaction.
Process hollowing occurs when a process is created in a suspended state then its memory is unmapped and replaced with mal
Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the c
elevated privileges. Execution via process injection may also evade detection from security products since the execution is ma
Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed softw
During the boot process, macOS executes source /etc/rc.common, which is a shell script containing various utility functions.
thus recommended to include in the start of Startup Item Scripts . In macOS and OS X, this is now a deprecated technique in fa
Starting in Mac OS X 10.7 (Lion), users can specify certain applications to be re-opened when a user reboots their machine. Wh
(plist) that contain this information as well located at ~/Library/Preferences/com.apple.loginwindow.plist and ~/Library
Adversaries may use more than one remote access tool with varying command and control protocols or credentialed access to
Adding an entry to the "run keys" in the Registry or startup folder will cause the program referenced to be executed when a u
permissions level.
Regsvcs and Regasm are Windows command-line utilities that are used to register .NET Component Object Model (COM) asse
Regsvr32.exe is a command-line program used to register and unregister object linking and embedding controls, including dyn
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, Am
These services are commonly used as legitimate technical support software, and may be whitelisted within a target environme
legitimate software commonly used by adversaries.
Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system des
Files may be copied from one system to another to stage adversary tools or other files over the course of an operation. Files m
An adversary may use Valid Accounts to log into a service specifically designed to accept remote connections, such as telnet, S
Adversaries will likely attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a networ
access tools to enable this, but utilities available on the operating system could also be used. Adversaries may also use local ho
Adversaries may move onto systems, possibly those on disconnected or air-gapped networks, by copying malware to removab
the case of Lateral Movement, this may occur through modification of executable files stored on removable media or by copyi
the case of Initial Access, this may occur through manual manipulation of the media, modification of systems used to initially f
Adversaries may leverage the resources of co-opted systems in order to solve resource intensive problems which may impact
An adversary may revert changes made to a cloud instance after they have performed malicious activities in attempt to evade
infrastructure, this may be easily facilitated using restoration from VM or data storage snapshots through the cloud managem
instance. Most cloud providers provide various types of storage including persistent, local, and/or ephemeral, with the latter t
Rootkits are programs that hide the existence of malware by intercepting (i.e., Hooking) and modifying operating system API c
level in the operating system or lower, to include a Hypervisor, Master Boot Record, or the System Firmware.
The rundll32.exe program can be called to execute an arbitrary binary. Adversaries may take advantage of this functionality to
process because of whitelists or false positives from Windows using rundll32.exe for normal operations.
Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user. By manipulatin
decision making.
Utilities such as at and schtasks, along with the Windows Task Scheduler, can be used to schedule programs or scripts to be ex
is met to use RPC and file and printer sharing is turned on. Scheduling a task on a remote system typically required being a me
Data exfiltration may be performed only at certain times of day or at certain intervals. This could be done to blend traffic patte
Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen
operations.
Screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (PE) file
C:\Windows\System32\, and C:\Windows\sysWOW64\ on 64-bit Windows systems, along with screensavers included with
Adversaries may use scripts to aid in operations and perform multiple actions that would otherwise be manual. Scripting is use
Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on
Windows Security Support Provider (SSP) DLLs are loaded into the Local Security Authority (LSA) process at system start. Once
such as any logged-on user's Domain password or smart card PINs. The SSP configuration is stored in two Registry keys: HKLM
HKLM\SYSTEM\CurrentControlSet\Control\Lsa\OSConfig\Security Packages. An adversary may modify these Registry k
Windows API function is called.
In OS X prior to El Capitan, users with root access can read plaintext keychain passwords of logged-in users because Apple’s ke
passwords. Apple’s securityd utility takes the user’s logon password, encrypts it with PBKDF2, and stores this master key in me
found, an attacker need only iterate over the other values to unlock the final password.
Adversaries may abuse legitimate extensible development features of server applications to establish persistent access to syst
software to extend the functionality of the main application. Adversaries may install malicious software components to malicio
Adversaries may execute a binary, command, or script via a method that interacts with Windows services, such as the Service
technique is the execution used in conjunction with New Service and Modify Existing Service during service persistence or priv
Windows stores local service configuration information in the Registry under HKLM\SYSTEM\CurrentControlSet\Services.
parameters through tools such as the service controller, sc.exe, PowerShell, or Reg. Access to Registry keys is controlled throu
Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical
to the environment.
When the setuid or setgid bits are set on Linux or macOS for an application, this means that the application will run with the p
regardless of which user or group owns the application. There are instances where programs need to be executed in an elevat
creating an entry in the sudoers file, which must be done by root, any user can specify the setuid or setgid flag to be set for th
-l. The chmod program can set these bits with via bitmasking, chmod 4777 [file] or via shorthand naming, chmod u+s [file
Adversaries may add malicious content to an internally accessible website through an open network file share that contains th
the server to execute the malicious content. The malicious content will typically run under the context and permissions of the
server is configured.
Shortcuts or symbolic links are ways of referencing other files or programs that will be opened or executed when the shortcut
The Windows security identifier (SID) is a unique value that identifies a user or group account. SIDs are used by Windows secu
Directory attribute , allowing inter-operable account migration between domains (e.g., all values in SID-History are included in
Binaries signed with trusted digital certificates can execute on Windows systems protected by digital signature validation. Sev
files. This behavior may be abused by adversaries to execute malicious files that could bypass application whitelisting and sign
accounted for within the existing techniques.
Scripts signed with trusted certificates can be used to proxy execution of malicious files. This behavior may bypass signature v
In user mode, Windows Authenticode digital signatures are used to verify a file's origin and integrity, variables that may be use
signature validation process is handled via the WinVerifyTrust application programming interface (API) function, which accept
of a signature.
Adversaries may attempt to get a listing of non-security related software that is installed on the system. Adversaries may use t
Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in
code in memory.
The source command loads functions into the current shell or executes files in the current context. This built-in command can
Take note of the space after the ".". Without a space, a new shell is created that runs the program instead of running the prog
update a specific shell's environment.
Adversaries can hide a program's true filetype by changing the extension of a file. With certain file types (specifically this does
by the operating system. For example, if there is a Mach-O executable file called evil.bin, when it is double clicked by a user, it
launch with the default text editing application (not executing the binary). However, if the file is renamed to "evil.txt " (note th
appropriately and the binary will be executed .
Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms of spe
Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it emplo
itself, to avoid defenses that may inspect email attachments.
Spearphishing via service is a specific variant of spearphishing. It is different from other forms of spearphishing in that it emplo
Secure Shell (SSH) is a standard means of remote access on Linux and macOS systems. It allows a user to connect to another s
asymmetric encryption key pair.
Adversaries may communicate using a common, standardized application layer protocol such as HTTP, HTTPS, SMTP, or DNS t
those commands, will be embedded within the protocol traffic between the client and server.
Adversaries may explicitly employ a known encryption algorithm to conceal command and control traffic rather than relying o
implementations may be vulnerable to reverse engineering if necessary secret keys are encoded and/or generated within mal
Use of a standard non-application layer protocol for communication between host and C2 server or among infected hosts with
protocols, such as the Internet Control Message Protocol (ICMP), transport layer protocols, such as the User Datagram Protoco
as Serial over LAN (SOL).
Per Apple’s documentation, startup items execute during the final phase of the boot process and contain shell scripts or other
all startup items . This is technically a deprecated version (superseded by Launch Daemons), and thus the appropriate folder, /
macOS Sierra. A startup item is a directory whose executable and configuration property list (plist), StartupParameters.plist
Adversaries can steal user application access tokens as a means of acquiring credentials to access remote systems and resourc
An adversary may steal web application or service session cookies and use them to gain access web applications or Internet se
cookies as an authentication token after a user has authenticated to a website.
Adversaries may insert, delete, or manipulate data at rest in order to manipulate external outcomes or hide activity. By manip
decision making.
The sudoers file, /etc/sudoers, describes which users can run which commands and from which terminals. This also describes
are running in their lowest possible permissions for most of the time and only elevate to other users or permissions as needed
passwords with a line like user1 ALL=(ALL) NOPASSWD: ALL .
The sudo command "allows a system administrator to delegate authority to give certain users (or groups of users) the ability t
arguments." Since sudo was made for the system administrator, it has some useful configuration features such as a timestam
password. This is because sudo has the ability to cache credentials for a period of time. Sudo creates (or touches) a file at /va
tty_tickets variable that treats each new tty (terminal session) in isolation. This means that, for example, the sudo timeout of
Supply chain compromise is the manipulation of products or product delivery mechanisms prior to receipt by a final consumer
The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interface (
hardware of a computer.
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, h
Adversaries will likely look for details about the network configuration and settings of systems they access or through informa
gather this information. Examples include Arp, ipconfig/ifconfig, nbtstat, and route.
Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently access
Adversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or w
using Credential Dumping. The information may be collected in a number of different ways using other Discovery techniques,
file/directory ownership, session information, and system logs. Adversaries may use the information from System Owner/User
fully infects the target and/or attempts specific actions.
Adversaries may try to get information about registered services. Commands that may obtain information about services using
also use other tools as well. Adversaries may use the information from System Service Discovery during automated discovery t
specific actions.
Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating system
also be used to initiate a shutdown/reboot of a remote computer. Shutting down or rebooting systems may disrupt access to c
The system time is set and stored by the Windows Time Service within a domain to maintain time synchronization between sy
Systemd services can be used to establish persistence on a Linux system. The systemd service manager is commonly used for m
default initialization (init) system on many Linux distributions starting with Debian 8, Ubuntu 15.04, CentOS 7, RHEL 7, Fedora
the aforementioned init systems.
Content stored on network drives or in other shared locations may be tainted by adding malicious programs, scripts, or exploit
executed to run the adversary's code on a remote system. Adversaries may use tainted shared content to move laterally.
Microsoft’s Open Office XML (OOXML) specification defines an XML-based format for Office documents (.docx, xlsx, .pptx) to r
various XML files, referred to as parts, containing properties that collectively define how a document is rendered.
Third-party applications and software deployment systems may be in use in the network environment for administration purp
execute code.
The Windows Time service (W32Time) enables time synchronization across and within domains. W32Time time providers are
network clients.
Timestomping is a technique that modifies the timestamps of a file (the modify, access, create, and change times), often to mi
An adversary may exfiltrate data by transferring the data, including backups of cloud environments, to another cloud account
detection.
Adversaries may alter data en route to storage or other systems in order to manipulate external outcomes or hide activity. By
understanding, and decision making.
The trap command allows programs and shells to specify commands that will be executed upon receiving interrupt signals. A
ctrl+c and ctrl+d. Adversaries can use this to register code to be executed when the shell encounters specific interrupts eith
'command list' signals where "command list" will be executed when "signals" are received.
There are many utilities used for software development related tasks that can be used to execute code in various forms to ass
certificates that allow them to execute on a system and proxy execution of malicious code through a trusted process that effe
Adversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted thir
standard mechanisms of gaining access to a network.
Use of two- or multifactor authentication is recommended and provides a higher level of security than user names and passwo
security mechanisms. Adversaries may target authentication mechanisms, such as smart cards, to gain access to systems, serv
Adversaries may conduct C2 communications over a non-standard port to bypass proxies and firewalls that have been improp
Adversaries may create cloud instances in unused geographic service regions in order to evade detection. Access is usually obt
An adversary may rely upon specific actions by a user in order to gain execution. This may be direct code execution, such as w
extension of a document file. It also may lead to other execution techniques, such as when a user clicks on a link delivered via
Execution. Adversaries may use several types of files that require a user to execute them, including .doc, .pdf, .xls, .rtf, .scr, .ex
Adversaries may steal the credentials of a specific user or service account using Credential Access techniques or capture crede
An adversary can leverage a computer's peripheral devices (e.g., integrated cameras or webcams) or applications (e.g., video c
from devices or applications, potentially in specified intervals, in lieu of video files.
Adversaries may check for the presence of a virtual machine environment (VME) or sandbox to avoid potential detection of to
Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised system
Adversaries can use stolen session cookies to authenticate to web applications and services. This technique bypasses some mu
A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a
the system that hosts the Web server. In addition to a server-side script, a Web shell may have a client interface program that
Windows systems have hidden network shares that are accessible only to administrators and provide the ability for remote fil
Windows Management Instrumentation (WMI) is a Windows administration feature that provides a uniform environment for
access and the server message block (SMB) and Remote Procedure Call Service (RPCS) for remote access. RPCS operates over
Windows Management Instrumentation (WMI) can be used to install event filters, providers, consumers, and bindings that ex
and execute arbitrary code when that event occurs, providing persistence on a system. Adversaries may attempt to evade det
extension). Examples of events that may be subscribed to are the wall clock time or the computer's uptime. Several threat gro
Windows Remote Management (WinRM) is the name of both a Windows service and a protocol that allows a user to interact
winrm command or by any number of programs such as PowerShell.
Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SAS)
NT\CurrentVersion\Winlogon\ and HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\ are used to man
Extensible Stylesheet Language (XSL) files are commonly used to describe the processing and rendering of data within XML file
languages.
Completed
de\Microsoft\Windows NT\CurrentVersion\Windows are loaded by user32.dll into every process that loads user32.dll. In practice this is n
application shimming feature allows developers to apply fixes to applications (without rewriting code) that were created for Windows XP
ng set criteria such as file type, location, or name at specific time intervals. This functionality could also be built into remote access tools.
ised, with the likelihood that an Internet-connected system was compromised first and the second through lateral movement by Replicati
ny from protections targeting executables/binaries. These payloads will need to be compiled before execution; typically via native utilities
echnique may be similar to System Firmware but conducted upon other system components that may not have the same capability or lev
y tools exist that enable traffic redirection through proxies or port redirection, including HTRAN, ZXProxy, and ZXPortMap. Adversaries use
s or developing custom protocols (including raw sockets) on top of fundamental protocols provided by TCP/IP/another standard network
tch, or a design vulnerability. These applications are often websites, but can include databases (like SQL), standard services (like SMB or SS
credential authentication for these services. Services such as Windows Remote Management can also be used externally.
ring automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts sp
prevents users with userIDs 500 and lower from appearing at the login screen. By using the Create Account technique with a userID under
1 hypervisor operates at a level below the operating system and could be designed with Rootkit functionality to hide its existence from the
module is the device driver, which allows the kernel to access hardware connected to the system. When used maliciously, Loadable Kern
cannot be done remotely unless used in conjunction within an established remote session, like secure shell (SSH).
anagement Framework are not visible in the System Preferences and can only be removed by the application that created them . Users hav
enterprise network. This would help the adversary to create a list of common passwords and launch dictionary and/or brute force attacks
a vulnerable application that loads a CMD or BAT file with the CreateProcess function.
mize user environments. PowerShell supports several profiles depending on the user or host program. For example, there can be different
the information from Process Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary
s. Some scripting languages may be used to bypass process monitoring mechanisms by directly interacting with the operating system at a
information from Security Software Discovery during automated discovery to shape follow-on behaviors, including whether or not the ad
ols for persistence. They may create a new shortcut as a means of indirection that may use Masquerading to look like a legitimate program
cluding whether or not the adversary fully infects the target and/or attempts specific actions.
lectronically delivered social engineering targeted at a specific individual, company, or industry. In this scenario, adversaries attach a file t
n Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/
ated by the adversary so that they do not appear conspicuous to forensic investigators or file analysis tools. Timestomping may be used alo
ctions of the implant or disengage from the victim. They may also search for VME artifacts before dropping secondary or additional payloa
ery process that loads user32.dll. In practice this is nearly every program, since user32.dll is a very common library. Similar to Process Injec
rewriting code) that were created for Windows XP so that it will work with Windows 10. Within the framework, shims are created to act a
onents that may not have the same capability or level of integrity checking. Malicious device firmware could provide both a persistent leve
g HTRAN, ZXProxy, and ZXPortMap. Adversaries use these types of proxies to manage command and control communications, to reduce th
cols provided by TCP/IP/another standard network stack.
tabases (like SQL), standard services (like SMB or SSH), and any other applications with Internet accessible open sockets, such as web serv
ement can also be used externally.
the Create Account technique with a userID under 500 and enabling this property (setting it to Yes), an adversary can hide their user acco
h Rootkit functionality to hide its existence from the guest operating system. A malicious hypervisor of this nature could be used to persist
he system. When used maliciously, Loadable Kernel Modules (LKMs) can be a type of kernel-mode Rootkit that run with the highest ope
ion, like secure shell (SSH).
ved by the application that created them . Users have direct control over login items installed using a shared file list which are also visible i
ds and launch dictionary and/or brute force attacks which adheres to the policy (e.g. if the minimum password length should be 8, then no
host program. For example, there can be different profiles for PowerShell host programs such as the PowerShell console, PowerShell ISE o
n behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
ntations and third-party tools that provide graphical access Remote Services similar to RDS.
ol such as FTP. Files can also be copied over on Mac and Linux with native tools like scp, rsync, and sftp.
y directly interacting with the operating system at an API level instead of calling other programs. Common scripting languages for Window
ollow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
use Masquerading to look like a legitimate program. Adversaries could also edit the target path or entirely replace an existing shortcut so
industry. In this scenario, adversaries attach a file to the spearphishing email and usually rely upon User Execution to gain execution.
er or not the adversary fully infects the target and/or attempts specific actions.
or file analysis tools. Timestomping may be used along with file name Masquerading to hide malware and tools.
acts before dropping secondary or additional payloads. Adversaries may use the information from learned from Virtualization/Sandbox Ev
dll is a very common library. Similar to Process Injection, these values can be abused to obtain persistence and privilege escalation by caus
0. Within the framework, shims are created to act as a buffer between the program (or more specifically, the Import Address Table) and th
mmands and files would be relayed from the disconnected system to the Internet-connected system to which the adversary has direct acce
evice firmware could provide both a persistent level of access to systems despite potential typical failures to maintain access and hard dis
ommand and control communications, to reduce the number of simultaneous outbound network connections, to provide resiliency in the
Internet accessible open sockets, such as web servers and related services. Depending on the flaw being exploited this may include Explo
tting it to Yes), an adversary can hide their user accounts much more easily: sudo dscl . -create /Users/username UniqueID 401 .
us hypervisor of this nature could be used to persist on systems through interruption.
kernel-mode Rootkit that run with the highest operating system privilege (Ring 0). Adversaries can use loadable kernel modules to cover
stalled using a shared file list which are also visible in System Preferences . These login items are stored in the user's ~/Library/Preferences
the minimum password length should be 8, then not trying passwords such as 'pass123'; not checking for more than 3-4 passwords per ac
ms such as the PowerShell console, PowerShell ISE or Visual Studio Code. An administrator can also configure a profile that applies to all us
rograms. Common scripting languages for Windows include VBScript and PowerShell but could also be in the form of command-line batch
or attempts specific actions.
rget path or entirely replace an existing shortcut so their tools will be executed instead of the intended legitimate program.
more specifically, the Import Address Table) and the Windows OS. When a program is executed, the shim cache is referenced to determin
ected system to which the adversary has direct access.
ntial typical failures to maintain access and hard disk re-images, as well as a way to evade host software-based defenses and integrity chec
nd network connections, to provide resiliency in the face of connection loss, or to ride over existing trusted communications paths betwee
g on the flaw being exploited this may include Exploitation for Defense Evasion.
create /Users/username UniqueID 401 .
versaries can use loadable kernel modules to covertly persist on a system and evade defenses. Examples have been found in the wild and
items are stored in the user's ~/Library/Preferences/ directory in a plist file called com.apple.loginitems.plist . Some of these applications c
3'; not checking for more than 3-4 passwords per account if the lockout is set to 6 as to not lock out accounts).
ator can also configure a profile that applies to all users and host programs on the local computer.
ut could also be in the form of command-line batch scripts.
of the intended legitimate program.
o shape follow-on behaviors.
d run in the context of separate processes on the computer.
executed, the shim cache is referenced to determine if the program requires the use of the shim database (.sdb). If so, the shim database
de host software-based defenses and integrity checks.
computer.
f the shim database (.sdb). If so, the shim database uses Hooking to redirect the code as necessary in order to communicate with the OS.
but they don’t all have to since there is an option to ‘Hide’ the window. If an adversary can register their own login item or modified an ex
as necessary in order to communicate with the OS.
y can register their own login item or modified an existing one, then they can use it to execute their code for a persistence mechanism eac
xecute their code for a persistence mechanism each time the user logs in . The API method SMLoginItemSetEnabled can be used to set Lo
thod SMLoginItemSetEnabled can be used to set Login Items, but scripting languages like AppleScript can do this as well .
ke AppleScript can do this as well .
ID Name
T1453 Abuse Accessibility Features
T1401 Abuse Device Administrator Access to Prevent Removal
T1435 Access Calendar Entries
T1433 Access Call Log
T1432 Access Contact List
T1517 Access Notifications
Data is encrypted before being exfiltrated in order to hide the information that is being exfiltrated from detection or to ma
programming library, or custom algorithm on the data itself and is considered separate from any encryption performed by
An adversary may encrypt files stored on the mobile device to prevent the user from accessing them, for example with the
generally limited to only encrypting files in external/shared storage locations. This technique has been demonstrated on A
Sensitive data can be collected from local system sources, such as the file system or databases of information residing on t
An adversary could wipe the entire device contents or delete specific files. A malicious application could obtain and abuse
privileges could be used to delete individual files.
Malicious applications are a common attack vector used by adversaries to gain a presence on mobile devices. Mobile devic
Apple App Store). An adversary may seek to place a malicious application in an authorized app store, enabling the applicati
Malicious applications are a common attack vector used by adversaries to gain a presence on mobile devices. This techniq
(e.g., Google Play Store or Apple App Store). Adversaries may wish to avoid placing malicious applications in an authorized
configured to allow application installation only from an authorized app store which would prevent this technique from wo
An adversary may seek to lock the legitimate user out of the device, for example to inhibit user interaction or to obtain a r
An adversary could use knowledge of the techniques used by security software to evade detection. For example, some mo
"su" binary, but that check could be evaded by naming the binary something else. Similarly, polymorphic code techniques
Adversaries may use Domain Generation Algorithms (DGAs) to procedurally generate domain names for command and con
An adversary could cause the mobile device to use less secure protocols, for example by jamming frequencies used by new
may make communication easier to eavesdrop upon or manipulate.
An app could download and execute dynamic code (not included in the original application package) after installation to ev
application store review.
As described by Drive-by Compromise, a drive-by compromise is when an adversary gains access to a system through a use
If network traffic between the mobile device and remote servers is unencrypted or is encrypted in an insecure manner, the
Malicious applications may attempt to detect their operating environment prior to fully executing their payloads. These ch
for application vetting, security research, or reverse engineering.
Adversaries may attempt to exploit enterprise servers, workstations, or other resources over the network. This technique
or through a Virtual Private Network (VPN).
A malicious app can exploit unpatched vulnerabilities in the operating system to obtain escalated privileges.
An adversary could exploit signaling system vulnerabilities to redirect calls or text messages (SMS) to a phone number und
communication. Interception of SMS messages could enable adversaries to obtain authentication codes used for multi-fac
An adversary could exploit signaling system vulnerabilities to track the location of mobile devices.
A malicious app or other attack vector could be used to exploit vulnerabilities in code running within the Trusted Execution
access cryptographic keys or other sensitive data . Escalated operating system privileges may be first required in order to h
system .
If the mobile device is connected (typically via USB) to a charging station or a PC, for example to charge the device's batter
connection.
The mobile device may be targeted for exploitation through its interface to cellular networks or other radio interfaces.
On Android, command line tools or the Java file APIs can be used to enumerate file system contents. However, Linux file p
a privilege escalation exploit). The contents of the external storage directory are generally visible, which could present con
An adversary could seek to generate fraudulent advertising revenue from mobile devices, for example by triggering autom
Adversaries may capture user input to obtain credentials or other information from the user through various methods.
A malicious application can inject input to the user interface to mimic user interaction through the abuse of Android's acce
The operating system and installed applications often have legitimate needs to prompt the user for sensitive information s
mimic this functionality to prompt users for sensitive information.
An adversary could attempt to install insecure or malicious configuration settings on the mobile device, through means suc
containing a web link to the configuration settings. The device user may be tricked into installing the configuration settings
An attacker could jam radio signals (e.g. Wi-Fi, cellular, GPS) to prevent the mobile device from communicating.
An adversary could use a malicious or exploited application to surreptitiously track the device's physical location through u
An adversary with physical access to a mobile device may seek to bypass the device's lockscreen.
An adversary could use access to a compromised device's credentials to attempt to manipulate app store rankings or ratin
privileged access (a rooted or jailbroken device).
If network traffic between the mobile device and a remote server is not securely protected, then an attacker positioned on
researchers found in 2014 that 68% of the top 1,000 free applications in the Google Play Store had at least one Transport L
middle attacks .
An adversary could distribute developed malware by masquerading the malware as a legitimate application. This can be do
application.
ART (the Android Runtime) compiles optimized code on the device itself to improve performance. An adversary may be ab
compiled on the device, it may not receive the same level of integrity checks that are provided to code running in the syste
If an adversary can escalate privileges, he or she may be able to use those privileges to place malicious code in the device k
may not be removable by the device user. In some cases (e.g., the Samsung Knox warranty bit as described under Detectio
functionality.
If an adversary can escalate privileges, he or she may be able to use those privileges to place malicious code in the device s
If an adversary can escalate privileges, he or she may be able to use those privileges to place malicious code in the device's
detection, may persist after device resets, and may not be removable by the device user. Running code within the TEE may
Adversaries may use device sensors to collect information about nearby networks, such as Wi-Fi and Bluetooth.
Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to rem
mobile device. This technique may take advantage of the mobile device's access to an internal enterprise network either t
An adversary may capture network traffic to and from the device to obtain credentials or other sensitive data, or redirect n
An app could contain malicious code in obfuscated or encrypted form, then deobfuscate or decrypt the code at runtime to
An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud backup services (e.g. Goog
For example, the Elcomsoft Phone Breaker product advertises the ability to retrieve iOS backup data from Apple's iCloud .
A malicious app could use standard Android APIs to send SMS messages. SMS messages could potentially be sent to premi
On Android versions prior to 5, applications can observe information about other processes that are running through meth
executing the ps command, or by examining the /proc directory. Starting in Android version 7, use of the Linux kernel's hi
An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud services (e.g. Google's And
device management (MDM) server console could use that access to track mobile devices.
An adversary who is able to obtain unauthorized access to or misuse authorized access to cloud services (e.g. Google's And
devices .
An adversary could set up a rogue cellular base station and then use it to eavesdrop on or manipulate cellular device comm
An adversary could set up unauthorized Wi-Fi access points or compromise existing access points and, if the device connec
Adversaries may use screen captures to collect information about applications running in the foreground, capture user dat
videos of another application running in the foreground by using the Android MediaProjectionManager (generally requir
screen contents being displayed by a foreground application. An adversary with root access or Android Debug Bridge (adb
An adversary could convince the mobile network operator (e.g. through social networking, forged identification, or insider
and account . The adversary could then obtain SMS messages or hijack phone calls intended for someone else .
Adversaries may communicate using a common, standardized application layer protocol such as HTTP, HTTPS, SMTP, or DN
Adversaries may explicitly employ a known encryption algorithm to conceal command and control traffic rather than relyin
implementations may be vulnerable to reverse engineering if necessary secret keys are encoded and/or generated within
As further described in Supply Chain Compromise, supply chain compromise is the manipulation of products or product de
A malicious application could suppress its icon from being displayed to the user in the application launcher to hide the fact
programmatically does not require any special permissions.
An adversary may attempt to get detailed information about the operating system and hardware, including version, patch
On Android, details of onboard network interfaces are accessible to apps through the java.net.NetworkInterface class . The
number .
On Android, applications can use standard APIs to gather a list of network connections to and from the device. For exampl
Adversaries may use non-standard ports to exfiltrate information.
An iOS application may be able to maliciously claim a URL scheme, allowing it to intercept calls that are meant for a differe
credentials.
Adversaries may use an existing, legitimate external Web service as a means for relaying commands to a compromised sys
Completed
geted for exploitation. For example, a website may contain malicious media content intended to exploit vulnerabilities in media parser
mewhat related, adversaries could also identify and exploit inadvertently present vulnerabilities. In many cases, it may be difficult to be
erabilities in media parsers as demonstrated by the Android Stagefright vulnerability .
es, it may be difficult to be certain whether exploitable functionality is due to malicious intent or simply inadvertent mistake.
vertent mistake.
ID Name
T1329 Acquire and/or use 3rd party infrastructure services
T1391 Choose pre-compromised mobile app developer account credentials or signing keys
T1261 Enumerate externally facing software applications technologies, languages, and dependencies
T1377 Exploit public-facing application
T1325 Fast Flux DNS
T1344 Friend/Follow/Connect to targets of interest
T1364 Friend/Follow/Connect to targets of interest
T1234 Generate analyst intelligence requirements
T1365 Hardware or software supply chain implant
T1314 Host-based hiding techniques
T1385 Human performs requested action of physical nature
T1233 Identify analyst level gaps
T1280 Identify business processes/tempo
T1272 Identify business relationships
T1283 Identify business relationships
T1225 Identify gap areas
T1270 Identify groups/roles
T1393 Test ability to evade automated mobile application security analysis performed by app stores
Key Intelligence Topics (KITs) and Key Intelligence Questions (KIQs) may be further subdivided to focus on political, econom
or KIQs in this manner in order to understand how the information they are pursuing can have multiple uses and to consid
Leadership assesses the areas of most interest to them and generates Key Intelligence Topics (KIT) or Key Intelligence Que
of interest, resulting in it being a KIT.
During mergers, divestitures, or other period of change in joint infrastructure or business processes there may be an oppo
practices may not be as noticeable.
Physical access may be required for certain types of adversarial actions.
An adversary may assess a target's operational security (OPSEC) practices in order to identify targeting options. A target m
environments.
Once a 3rd party vendor has been identified as being of interest it can be probed for vulnerabilities just like the main targe
Once generated, Key Intelligence Topics (KITs), Key Intelligence Questions (KIQs), and/or intelligence requirements are ass
energy requirements should be assigned to a specific organization based on their mission.
Leadership organizes Key Intelligence Topics (KITs) and Key Intelligence Questions (KIQs) into three types of categories and
adversary assesses the cyber defensive capabilities of a nation-state threat actor.
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
Delivery systems are the infrastructure used by the adversary to host malware or other tools used during exploitation. Bui
names, renting hosting space, or configuring previously exploited environments.
An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on co
exploits are still relevant to the environment they are trying to compromise.
For attacks incorporating social engineering the utilization of an on-line persona is important. These personas may be fictiti
(Facebook, LinkedIn, Twitter, Google+, etc.).
Domain Names are the human readable names used to represent one or more IP addresses. They can be purchased or, in
Command and Control (C2 or C&C) is a method by which the adversary communicates with malware. An adversary may us
compromised web sites, or even social media.
The adversary can use account credentials or signing keys of an existing mobile app developer to publish malicious update
reputation to publish new malicious apps. Many mobile devices are configured to automatically install new versions of alre
For attacks incorporating social engineering the utilization of an on-line persona is important. Utilizing an existing persona
relationship, or knowledge of, the compromised persona.
Certain types of traffic (e.g., Twitter14, HTTP) are more commonly used than others. Utilizing more common protocols and
Instead of buying, leasing, or renting infrastructure an adversary may compromise infrastructure and use it for some or all
Instead of buying, leasing, or renting infrastructure an adversary may compromise infrastructure and use it for some or all
There is usually a delay between when a vulnerability or exploit is discovered and when it is made public. An adversary ma
use during a different attack.
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
Active scanning is the act of sending transmissions to end nodes, and analyzing the responses, in order to identify informa
Leadership conducts a cost/benefit analysis that generates a compelling need for information gathering which triggers a K
the cost of cyber intrusions with the expected benefits from increased intelligence collection on cyber adversaries.
Passive scanning is the act of looking at existing network traffic in order to identify information about the communications
Social Engineering is the practice of manipulating people in order to get them to divulge information or take an action.
Social Engineering is the practice of manipulating people in order to get them to divulge information or take an action.
Social Engineering is the practice of manipulating people in order to get them to divulge information or take an action.
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
Backup infrastructure allows an adversary to recover from environmental and system failures. It also facilitates recovery o
longer viable.
A payload is the part of the malware which performs a malicious action. The adversary may create custom payloads when
Implementation plans specify how the goals of the strategic plan will be executed.
Use of removable media as part of the Launch phase requires an adversary to determine type, format, and content of the
Strategic plans outline the mission, vision, and goals for an adversary at a high level in relation to the key partners, topics,
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
Certain types of traffic (e.g., DNS tunneling, header inject) allow for user-defined fields. These fields can then be used to hi
hide data in images or other file formats. Detection can be difficult unless a particular signature is already known.
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
Leadership or key decision makers may derive specific intelligence requirements from Key Intelligence Topics (KITs) or Key
information to establish a baseline of information about a topic or question and collection managers to clarify the types of
A wide variety of cloud, virtual private services, hosting, compute, and storage solutions are available as 3rd party infrastru
compromise.
Infrastructure services includes the hardware, software, and network resources required to operate a communications env
owning organization.
The approach or attack vector outlines the specifics behind how the adversary would like to attack the target. As additiona
approach or attack vector.
Determining if a "corporate" help desk exists, the degree of access and control it has, and whether there are "edge" units t
Domain Names are the human readable names used to represent one or more IP addresses. IP addresses are the unique id
adversary who is looking to understand the structure of a network.
Network trusts enable communications between different networks with specific accesses and permissions. Network trust
Firmware is permanent software programmed into the read-only memory of a device. As with other types of software, firm
From a tactical viewpoint, an adversary could potentially have a primary and secondary level target. The primary target rep
corporate network within a corporation or the division within an agency.
If going from strategic down to tactical or vice versa, an adversary would next consider the operational element. For exam
Physical locality information may be used by an adversary to shape social engineering attempts (language, culture, events,
facility.
The secondary level tactical element the adversary seeks to attack is the specific network or area of a network that is vulne
be a SQL server or a domain controller with a known vulnerability.
An adversary undergoes an iterative target selection process that may begin either broadly and narrow down into specifics
process, an adversary may determine a high level target they wish to attack. One example of this may be a particular coun
Leadership derives Key Intelligence Topics (KITs) and Key Intelligence Questions (KIQs) from the areas of most interest to t
strategic and operational decisions, knowing the competition, and understanding the competitive situation. KIQs are the c
analytic work, and/or identify necessary external operations.
Both newly built personas and pre-compromised personas may require development of additional documentation to make
incorporating photos.
An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on co
exploits are no longer relevant to the environment they are trying to compromise. An adversary may monitor exploit prov
Email addresses, logon credentials, and other forms of online identification typically share a common format. This makes g
[email protected] it is likely that others in the company will have an email in the same format.
Removable media containing malware can be injected in to a supply chain at large or small scale. It can also be physically p
have the user utilize the removable media on a system where the adversary is trying to gain access.
An adversary could distribute malicious software development tools (e.g., compiler) that hide malicious behavior in softwa
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
DNS Calc is a technique in which the octets of an IP address are used to calculate the port for command and control server
****Deprecation Warning**** The use of algorithms in malware to periodically generate a large number of domain name
Domain Registration Hijacking is the act of changing the registration of a domain name without the permission of the origi
Dumpster diving is looking through waste for information on technology, people, and/or organizational items of interest.
Dynamic DNS is a method of automatically updating a name in the DNS system. Providers offer this rapid reconfiguration o
Dynamic DNS is a automated method to rapidly update the domain name system mapping of hostnames to IPs.
Client configurations information such as the operating system and web browser, along with additional information such a
accomplished in several ways including use of a compromised web site to collect details on visiting computers.
Software applications will be built using different technologies, languages, and dependencies. This information may reveal
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
A technique in which a fully qualified domain name has multiple IP addresses assigned to it which are swapped with extrem
resource record.
Once a persona has been developed an adversary will use it to create connections to targets of interest. These connection
A form of social engineering designed build trust and to lay the foundation for future interactions or attacks.
Analysts may receive Key Intelligence Topics (KITs) and Key Intelligence Questions (KIQs) from leadership or key decision m
topic or question.
During production and distribution, the placement of software, firmware, or a CPU chip in a computer, handheld, or other
Host based hiding techniques are designed to allow an adversary to remain undetected on a machine upon which they hav
exploiting weakness in file formats, parsers, or self-deleting code.
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
Analysts identify gap areas that generate a compelling need to generate a Key Intelligence Topic (KIT) or Key Intelligence Q
Understanding an organizations business processes and tempo may allow an adversary to more effectively craft social eng
Business relationship information includes the associates of a target and may be discovered via social media sites such as L
Business relationship information may be used by an adversary to shape social engineering attempts (exploiting who a targ
relationship.
Leadership identifies gap areas that generate a compelling need to generate a Key Intelligence Topic (KIT) or Key Intelligen
Personnel internally to a company may belong to a group or maintain a role with electronic specialized access, authorities,
administrator.
Job postings, on either company sites, or in other forums, provide information on organizational structure and often provid
information on technologies within the organization which could be valuable in attack or provide insight in to possible secu
Job postings, on either company sites, or in other forums, provide information on organizational structure, needs, and gap
as under-resourced IT shop). Job postings can also provide information on an organizations structure which could be valua
Job postings, on either company sites, or in other forums, provide information on organizational structure and often provid
information on people within the organization which could be valuable in social engineering attempts.
The attempt to identify people of interest or with an inherent weakness for direct or indirect targeting to determine an ap
OPSEC practices or those who have a trusted relationship with the intended target.
Personnel internally to a company may have non-electronic specialized access, authorities, or privilege that make them an
authorize large transactions. An adversary who compromises this individual might be able to subvert large dollar transfers
As with legitimate development efforts, different skill sets may be required for different phases of an attack. The skills nee
Security defensive capabilities are designed to stop or limit unauthorized network traffic or other types of accesses.
An adversary may identify sensitive personnel information not typically posted on a social media site, such as address, mar
searching public records that are frequently available for free or at a low cost online.
Supply chains include the people, processes, and technologies used to move a product or service from a supplier to a cons
organizational relationships.
Supply chains include the people, processes, and technologies used to move a product or service from a supplier to a cons
technology or interconnections that are part of the supply chain.
Supply chains include the people, processes, and technologies used to move a product or service from a supplier to a cons
people, their positions, and relationships, that are part of the supply chain.
Technology usage patterns include identifying if users work offsite, connect remotely, or other possibly less restricted/secu
Many applications use third-party software libraries, often without full knowledge of the behavior of the libraries by the ap
generate revenue for the application developer. Vulnerabilities in these third-party libraries could potentially be exploited
may still use older, vulnerable versions of the library.
An adversary can attempt to identify web defensive services as CloudFlare, IPBan, and Snort. This may be done by passivel
defenses.
An adversary needs the necessary skills to set up procured equipment and software to create their desired infrastructure.
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
A network topology is the arrangement of the various elements of a network (e.g., servers, workstations, printers, routers,
connected or related.
An adversary may research available open source information about a target commonly found on social media sites such a
interests and potentially inherent weaknesses of a target for exploitation by the adversary.
Technical blogs and forums provide a way for technical staff to ask for assistance or troubleshoot problems. In doing so the
The use of credentials by an adversary with the intent to hide their true identity and/or portray them self as another perso
credentials are legitimate and trustworthy when this is not actually the case.
Technical network hiding techniques are methods of modifying traffic to evade network signature detection or to utilize m
operations, or seeding with misinformation.
Using alternative payment options allows an adversary to hide their activities. Options include crypto currencies, barter sy
Obfuscation is hiding the day-to-day building and testing of new tools, chat servers, etc.
Obfuscation is hiding the day-to-day building and testing of new tools, chat servers, etc.
Obfuscation is hiding the day-to-day building and testing of new tools, chat servers, etc.
Obfuscation is the act of creating code that is more difficult to understand. Encoding transforms the code using a publicly a
encryption.
Obfuscation is the act of creating communications that are more difficult to understand. Encryption transforms the commu
The adversary can obtain an Apple iOS enterprise distribution key pair and certificate and use it to distribute malicious app
the apps could potentially be detected).
Configure and setup booter/stressor services, often intended for server stress testing, to enable denial of service attacks.
For a computing resource to be accessible to the public, domain names and IP addresses must be registered with an autho
Templates and branding materials may be used by an adversary to add authenticity to social engineering message.
A payload is the part of the malware which performs a malicious action. The adversary may re-use payloads when the nee
Google and Apple provide Google Cloud Messaging and Apple Push Notification Service, respectively, services designed to
apps running on individual devices. These services maintain an encrypted connection between every mobile device and Go
normal device operation. These services could be used by adversaries for communication to compromised mobile devices.
Redirecting a communication request from one address and port number combination to another. May be set up to obfus
After compromise, an adversary may utilize additional tools to facilitate their end goals. This may include tools to further e
Every domain registrar maintains a publicly viewable database that displays contact information for every registered doma
than the owner of the domain.
An adversary will require some physical hardware and software. They may only need a lightweight set-up if most of their a
infrastructure if they want to test, communicate, and control other aspects of their activities on their own systems.
Proxies act as an intermediary for clients seeking resources from other systems. Using a proxy may make it more difficult t
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
Applicable agencies and/or personnel receive intelligence requirements and evaluate them to determine sub-requirement
requirements may be further divided into nuclear facilities versus nuclear warhead capabilities.
Analysts may receive intelligence requirements from leadership and begin research process to satisfy a requirement. Part
possible aspects associating with satisfying a requirement.
A remote access tool (RAT) is a piece of software that allows a remote user to control a system as if they had physical acce
RAT.
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
Common Vulnerability Enumeration (CVE) is a dictionary of publicly known information about security vulnerabilities and e
If an adversary can identify which security tools a victim is using they may be able to identify ways around those tools.
Execution of code and network communications often result in logging or other system or network forensic artifacts. An ad
in changes to their code or adding additional actions (such as deleting a record from a log) to the code.
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
An adversary may secure and protect their infrastructure just as defenders do. This could include the use of VPNs, security
The process of gathering domain account credentials in order to silently create subdomains pointed at malicious servers w
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
Spearphishing for information is a specific variant of spearphishing. Spearphishing for information is different from other f
elctronically delivered social engineering targeted at a specific individual, company, or industry. Spearphishing for informa
involving malicious code. Spearphishing for information frequently involves masquerading as a source with a reason to col
to visit. The given website often closely resembles a legitimate site in appearance and has a URL containing elements from
attacker. Spearphishing for information may also try to obtain information directly through the exchange of emails, instant
Certificates are designed to instill trust. They include information about the key, information about its owner's identity, an
Fake certificates can be acquired by legal process or coercion. Or, an adversary can trick a Certificate Authority into issuing
Once they have been created, intelligence requirements, Key Intelligence Topics (KITs), and Key Intelligence Questions (KIQ
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
Once divided into the most granular parts, analysts work with collection managers to task the collection management syst
Many mobile devices are configured to only allow applications to be installed from the mainstream vendor app stores (e.g
stores deliberately designed to probe the stores' security analysis capabilities, with the goal of determining effective techn
Callbacks are malware communications seeking instructions. An adversary will test their malware to ensure the appropriat
Malware may perform differently on different platforms (computer vs handheld) and different operating systems (Ubuntu
environment(s) where they most expect it to be executed.
An adversary can run their code on systems with cyber security protections, such as antivirus products, in place to see if th
An adversary can test physical access options in preparation for the actual attack. This could range from observing behavio
An adversary can test the detections of malicious emails or files by using publicly available services, such as virus total, to s
available and don't publicly publish results or they can test on their own internal infrastructure.
An adversary can test their planned method of attack against existing security products such as email filters or intrusion de
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
****Deprecation Warning**** This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tacti
An adversary may stage software and tools for use during later stages of an attack. The software and tools may be placed o
infrastructure.
A technique used by the adversary similar to Dynamic DNS with the exception that the use of multiple DNS infrastructures
Completed
people (such as key hire announcements in industry articles). This information may be used by an adversary to shape social engineerin
If the signature is valid, and the person examining the certificate trusts the signer, then they know they can use that key to communica
ry to shape social engineering attempts (exploiting who a target expects to hear from) or to plan for technical actions such as exploitin
n use that key to communicate with its owner. Acquiring a certificate for a domain name similar to one that is expected to be trusted m
al actions such as exploiting network trust relationship.
is expected to be trusted may allow an adversary to trick a user in to trusting the domain (e.g., vvachovia instead of Wachovia -- homo
tead of Wachovia -- homoglyphs).
Achi
E
Techniques Achievement
1 First Steps… You completed your first challenge, no great feat has ever
5 High Five! Nothing beats a solid High Five, except maybe pizza…
10 Double or Nothing You spun the Wheel of Fortune and Emerged Victorious!
15 Moving Up Still cheaper than actually moving, you've devoted enough
20 Double Double or Nothing You've made it to 20, take some time to reflect on what yo
30 Knowledgeable 30, but how much of it have you retained, 30%? If so go ba
45 Mid Life Crisis It's all downhill from here, you've reached 45… but in the s
55 L33T H4CK3R You're likely 20% of the way through now, that's good enou
75 Senior Citizen Well and truly engulfed into MITRE ATT&CK, you've likely p
95 Just Short of a Dollar Even though you've done just short of a dollar in technique
110 Century is So Last Decade Hitting triple digits seems so long ago now. As you progress
135 Distributed Computing Here's to hoping you've learnt about DCOM by now, if not
155 Wait you've done 155!? I think you're lieing, or you've been doing this for a while, e
170 CLXX - Consulship of Clarus and Cornelius 170, well outliving anyone in existance… or at least to my k
180 No turning back now, well maybe a little… While you ponder about the different tactics and technique
210 MITRE ATT&CK NINJA You silently move through a sea of techniques which other
220 How about we change this one to 2020? Celebrate, you've kind of, made it to the year this documen
230 Go Outside Okay was your resolution to go outside? If not and you've f
240 No Seriously Go Outside You've literally done another 10 since last we spoke, you've
250 There's no stopping you now Powering past any barriers or hurdles you've managed to h
260 Just a little further I have no idea how you've made it this far, but you must ha
266 Megamind You've achieved a master status, and now have a lot to pon
Legendary Now that you've forgotten 1-260, revise
Achievements/Rewards
Enterprise Techniques
Description
nge, no great feat has ever been accomplished without taking the first step!
except maybe pizza…
and Emerged Victorious!
ng, you've devoted enough time and are well on your way
e time to reflect on what you've learnt, things are going to get interesting
u retained, 30%? If so go back and revise
ve reached 45… but in the spirit of ATT&CK, we're just getting started!
ough now, that's good enough to add some numbers into the achievement
TRE ATT&CK, you've likely picked up vast knowledge and a bit of a headache
hort of a dollar in techniques, you're definitely not short of a dollar mentally
ng ago now. As you progress it's important to make note of what you've found interesting
about DCOM by now, if not feel free to skip a roll and look into port 135 while you're here
een doing this for a while, either way be proud of what you've learnt
istance… or at least to my knowledge, you're surpassing your own limits in style
fferent tactics and techniques, remember there's likely more still to be discovered
a of techniques which otherwise would be undetected. You see, you observe, you learn
e it to the year this document was created. Think about your New Years Resolution, and just do it now!
outside? If not and you've forgotten to, please do, like seriously.
0 since last we spoke, you've learnt so much, don't forget some fresh air and a walk
urdles you've managed to hit 250. Lucky you, "Destination address valid". If you somehow haven't looked at Phishing, go there now.
e it this far, but you must have been drinking from the firehose. Seal the deal, you've almost made it!
s, and now have a lot to ponder, a lot to secure, or a lot of methods for offense. Soak it all up. Congratulations!
s/Rewards
echniques
Description
hed without taking the first step!