Please enable JavaScript.
Coggle requires JavaScript to display documents.
Techniques - Coggle Diagram
Techniques
Initial Access
- Adversary is trying to get into your network
-
-
-
Execution
- Adversary is trying to run malicious code
-
-
-
Persistence
- Adversary is trying to maintain their foothold
-
-
-
Privilege Escalation
- Adversary is trying to gain higher level permissions
-
-
-
Defense Evasion
- Adversary is trying to avoid being detected
-
-
-
Credential Access
- Adversary is trying to steal usernames and passwords
-
-
-
Discovery
- Adversary is trying to figure out your environment
-
-
-
Lateral Movement
- Adversary is trying to move through your environment
-
-
-
Collection
- Adversary is trying to gather data of interest to their goal
-
-
-
Command and Control
- Adversary is trying to communicate with compromised systems to control them
-
-
-
Exfiltration
- Adversary is trying to steal data
-
-
-
Impact
- The adversary is trying to manipulate, interrupt, or destroy your systems and data.
-
-
-