Drive-by Compromise |
User Execution |
.bash_profile and .bashrc |
Hooking |
Hidden Files and Directories |
Account Manipulation |
Account Discovery |
AppleScript |
Audio Capture |
Commonly Used Port |
Standard Application Layer Protocol |
Data Destruction |
Exploit Public-Facing Application |
CMSTP |
Accessibility Features |
Accessibility Features |
File Deletion |
Bash History |
Application Window Discovery |
Application Deployment Software |
Automated Collection |
Communication Through Removable Media |
Data Compressed |
Data Encrypted for Impact |
External Remote Services |
Command-Line Interface |
Account Manipulation |
AppCert DLLs |
Hidden Window |
Brute Force |
Browser Bookmark Discovery |
Distributed Component Object Model |
Clipboard Data |
Connection Proxy |
Data Encrypted |
Defacement |
Hardware Additions |
PowerShell |
Component Firmware |
AppInit DLLs |
Process Injection |
Credential Dumping |
Domain Trust Discovery |
Exploitation of Remote Services |
Data Staged |
Custom Command and Control Protocol |
Data Transfer Size Limits |
Disk Content Wipe |
Replication Through Removable Media |
Execution through API |
Registry Run Keys |
Application Shimming |
Modify Registry |
Credentials in Files |
File and Directory Discovery |
Logon Scripts |
Data from Information Repositories |
Custom Cryptographic Protocol |
Exfiltration Over Alternative Protocol |
Disk Structure Wipe |
|
|
Bootkit |
DLL Search Order Hijacking |
Disabling Security Tools |
|
Security Software Discovery |
Replication Through Removable Media |
|
Uncommonly Used Port |
|
|
|
|
New Service |
|
Masquerading |
|
|
|
|
Remote File Copy |
|
|
|
|
Modify Existing Service |
|
Indicator Removal from Tools |
|
|
|
|
|
|
|
|
|
|
|
Software Packing |
|
|
|
|
|
|
|