monkey/docs/content/reference/mitre_techniques.md

6.9 KiB

title date draft pre weight
MITRE ATT&CK 2020-09-24T08:18:37+03:00 false &nbsp<b><u>&</u></b> 10

{{% notice info %}} Check out the documentation for the MITRE ATT&CK report as well. {{% /notice %}}

The Infection Monkey maps its actions to the MITRE ATT&CK knowledge base and, based on this, provides a report detailing the techniques it used along with any recommended mitigations. This helps you simulate an advanced persistent threat (APT) attack on your network and mitigate real attack paths intelligently.

In the following table, we provide the list of all the MITRE ATT&CK techniques the Monkey provides info about, categorized by the tactic. You can follow any of the links below to learn more about a specific technique or tactic.

TACTIC TECHNIQUES
Execution Command-line Interface
Execution Through Module Load
Execution Through API
Powershell
Scripting
Service Execution
Trap
Persistence .bash_profile & .bashrc
Create Account
Hidden Files & Directories
Local Job Scheduling
Powershell Profile
Scheduled Task
Setuid & Setgid
Defence Evasion BITS Job
Clear Command History
File Deletion
File Permissions Modification
Timestomping
Signed Script Proxy Execution
Credential Access Brute Force
Credential Dumping
Private Keys
Discovery Account Discovery
Remote System Discovery
System Information Discovery
System Network Configuration Discovery
Lateral Movement Exploitation Of Remote Services
Pass The Hash
Remote File Copy
Remote Services
Collection Data From Local System
Command And Control Connection Proxy
Uncommonly Used Port
Multi-hop Proxy
Exfiltration Exfiltration Over Command And Control Channel