About 12,200 results
Open links in new tab
  1. Techniques - Enterprise | MITRE ATT&CK®

    Techniques represent 'how' an adversary achieves a tactical goal by performing an action. For example, an adversary may dump credentials to achieve credential access.

  2. MITRE ATT&CK®

    MITRE ATT&CK ® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the …

  3. Enterprise tactics - MITRE ATT&CK®

    Enterprise tactics Tactics represent the "why" of an ATT&CK technique or sub-technique. It is the adversary's tactical goal: the reason for performing an action. For example, an adversary may want …

  4. Phishing, Technique T1566 - Enterprise | MITRE ATT&CK®

    Phishing may also involve social engineering techniques, such as posing as a trusted source, as well as evasive techniques such as removing or manipulating emails or metadata/headers from …

  5. Initial Access, Tactic TA0001 - Enterprise | MITRE ATT&CK®

    Oct 17, 2018 · Initial Access consists of techniques that use various entry vectors to gain their initial foothold within a network. Techniques used to gain a foothold include targeted spearphishing and …

  6. Enterprise Matrix - MITRE ATT&CK®

    Below are the tactics and techniques representing the MITRE ATT&CK ® Matrix for Enterprise. The Matrix contains information for the following platforms: Windows, macOS, Linux, PRE, Office Suite, …

  7. Defense Evasion, Tactic TA0005 - Enterprise | MITRE ATT&CK®

    Oct 17, 2018 · Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to …

  8. Get Started | MITRE ATT&CK®

    ATT&CK is knowledge base of adversarial techniques based on real-world observations. ATT&CK focuses on how adversaries interact with systems during an operation, reflecting the various phases …

  9. Techniques - ICS | MITRE ATT&CK®

    Techniques represent 'how' an adversary achieves a tactical goal by performing an action. For example, an adversary may dump credentials to achieve credential access.

  10. Valid Accounts, Technique T1078 - Enterprise | MITRE ATT&CK®

    Oct 24, 2018 · Sub-techniques (4) Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.