MITRE ID : T1218.005 Tactic : Defense Evasion Platforms: Windows MSHTA Mshta.exe is a utility that executes Microsoft HTML Applications (HTA) files. Adversaries may abuse mshta.exe to prox...
Process Discovery
Process Discovery ID : T1057 Tactic : Discovery Platforms: Windows, linux, macos Process Discovery Adversaries may attempt to get information about running processes on a system. Informa...
Permission Groups Discovery -> Local Groups
Permission Groups Discovery : Local Groups ID : T1069.001 Tactic : Discovery Platforms: Windows, linux, macos Local Groups Adversaries may attempt to find local system groups and permiss...
Permission Groups Discovery -> Domain Groups
Permission Groups Discovery : Domain Groups ID : T1069.002 Tactic : Discovery Platforms: Windows, linux, macos Domain Groups Adversaries may attempt to find domain-level groups and permi...
Group Policy Discovery
Group Policy Discovery ID : T1615 Tactic : Discovery Platforms: Windows Group Policy Discovery Adversaries may gather information on Group Policy settings to identify paths for privilege...
Domain Account
Domain Account ID : T1087.002 Tactic : Discovery Platforms: Windows, linux, macos Local Account Adversaries may attempt to get a listing of domain accounts. This information can help adv...
Local Account
Local Account ID : T1087.001 Tactic : Discovery Platforms: Windows, linux, macos Local Account Adversaries may attempt to get a listing of local system accounts. This information can help...
Security Account Manager (SAM)
MITRE ID : T1003.002 Tactic : Credential Access Platforms: Windows Security Account Manager (SAM) SAM Is a database that is present on computers running Windows operating systems that st...
NTDS
MITRE ID : T1003.003 Tactic : Credential Access Platforms: Windows NTDS Ntds file is a database that stores Active Directory data, including information about user objects, groups and gr...
LSA Secrets
MITRE ID : T1003.004 Tactic : Credential Access Platforms: Windows LSA Secrets LSA Stands for Local Security Authority is a protected system process that authenticates and logs on users ...