Defense Evasion
Abuse Elevation Control MechanismAccess Token ManipulationBITS JobsBuild Image on HostDeobfuscate/Decode Files or InformationDirect Volume AccessDomain Policy ModificationExecution GuardrailsExploitation for Defense EvasionFile and Directory Permissions ModificationHide ArtifactsHijack Execution FlowImpair DefensesIndicator RemovalIndirect Command ExecutionMasqueradingModify Authentication ProcessModify Cloud EnvironmentModify RegistryModify System ImageNetwork Boundary BridgingObfuscated Files or InformationPre-OS BootProcess InjectionReflective Code LoadingRogue Domain ControllerRootkitSubvert Trust ControlsSystem Binary Proxy ExecutionSystem Script Proxy ExecutionTemplate InjectionTraffic SignalingUse Alternate Authentication MaterialValid AccountsVirtualization/Sandbox EvasionWeaken EncryptionXSL Script ProcessingCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Last updated