About 9,910 results
Open links in new tab
  1. Execution, Tactic TA0104 - ICS | MITRE ATT&CK®

    Oct 17, 2018 · Execution consists of techniques that result in adversary-controlled code running on a local or remote system, device, or other asset. This execution may also rely on unknowing end users …

  2. User Execution: Malicious File, Sub-technique T1204.002 - MITRE …

    An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution.

  3. Command and Scripting Interpreter - MITRE ATT&CK®

    Oct 24, 2018 · Adversaries may also execute commands through interactive terminals/shells, as well as utilize various Remote Services in order to achieve remote Execution. [1] [2] [3]

  4. Exploitation for Client Execution - MITRE ATT&CK®

    Exploitation for Client Execution Adversaries may exploit software vulnerabilities in client applications to execute code. Vulnerabilities can exist in software due to unsecure coding practices that can lead to …

  5. Hijack Execution Flow: Dynamic Linker Hijacking - MITRE ATT&CK®

    During the execution preparation phase of a program, the dynamic linker loads specified absolute paths of shared libraries from various environment variables and files, such as LD_PRELOAD on Linux or …

  6. System Services, Technique T1569 - Enterprise | MITRE ATT&CK®

    Adversaries can execute malicious content by interacting with or creating services either locally or remotely. Many services are set to run at boot, which can aid in achieving persistence (Create or …

  7. Execution, Tactic TA0002 - Enterprise | MITRE ATT&CK®

    Oct 17, 2018 · Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all …

  8. Process Injection: Thread Execution Hijacking, Sub-technique

    Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via Thread Execution …

  9. Command and Scripting Interpreter: - MITRE ATT&CK®

    Jul 16, 2018 · Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows …

  10. Deploy Container, Technique T1610 - Enterprise | MITRE ATT&CK®

    Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute processes associated with a …