مشاركة عبر


KnownTechniques enum

القيم المعروفة للتقنيات التي تقبلها الخدمة.

الحقول

AbuseElevationControlMechanism

AbuseElevationControlMechanism

AccessTokenManipulation

AccessTokenManipulation

AccountDiscovery

AccountDiscovery

AccountManipulation

إدارة الحساب

ActiveScanning

ActiveScanning

ApplicationLayerProtocol

ApplicationLayerProtocol

AudioCapture

صورة صوتية

BootOrLogonAutostartExecution

BootOrLogonAutostartExecution

BootOrLogonInitializationScripts

BootOrLogonInitializationScripts

BruteForce

BruteForce

CloudInfrastructureDiscovery

CloudInfrastructureDiscovery

CloudServiceDashboard

CloudServiceDashboard

CloudServiceDiscovery

CloudServiceDiscovery

CommandAndScriptingInterpreter

CommandAndScriptingInterpreter

CompromiseClientSoftwareBinary

CompromiseClientSoftwareBinary

CompromiseInfrastructure

البنية الأساسية ل CompromiseInfrastructure

ContainerAndResourceDiscovery

ContainerAndResourceDiscovery

CreateAccount

CreateAccount

CreateOrModifySystemProcess

CreateOrModifySystemProcess

CredentialsFromPasswordStores

CredentialsFromPasswordStores

DataDestruction

شفط البيانات

DataEncryptedForImpact

DataEncryptedForImpact

DataFromCloudStorageObject

DataFromCloudStorageObject

DataFromConfigurationRepository

DataFromConfigurationRepository

DataFromInformationRepositories

DataFromInformationRepositories

DataFromLocalSystem

DataFromLocalSystem

DataManipulation

إدارة البيانات

DataStaged

DataStaged

Defacement

تشويه

DeobfuscateDecodeFilesOrInformation

DeobfuscateDecodeFilesOrInformation

DiskWipe

DiskWipe

DomainTrustDiscovery

DomainTrustDiscovery

DriveByCompromise

DriveByCompromise

DynamicResolution

DynamicResolution

EndpointDenialOfService

EndpointDenialOfService

EventTriggeredExecution

EventTriggeredExecution

ExfiltrationOverAlternativeProtocol

ExfiltrationOverAlternativeProtocol

ExploitationForClientExecution

الاستغلالForClientExecution

ExploitationForCredentialAccess

ExploitationForCredentialAccess

ExploitationForDefenseEvasion

ExploitationForDefenseEvasion

ExploitationForPrivilegeEscalation

ExploitationForPrivilegeEscalation

ExploitationOfRemoteServices

ExploitationOfRemoteServices

ExploitPublicFacingApplication

ExploitPublicFacingApplication

ExternalRemoteServices

ExternalRemoteServices

FallbackChannels

القنوات الاحتياطية

FileAndDirectoryDiscovery

FileAndDirectoryDiscovery

FileAndDirectoryPermissionsModification

FileAndDirectoryPermissionsModification

GatherVictimNetworkInformation

معلومات تجميع معلومات الشبكة

HideArtifacts

HideArtifacts

HijackExecutionFlow

HijackExecutionFlow

ImpairDefenses

ضعف الدفاعات

ImplantContainerImage

صورة زراعة الزرع

IndicatorRemovalOnHost

IndicatorRemovalOnHost

IndirectCommandExecution

IndirectCommandExecution

IngressToolTransfer

IngressToolTransfer

InputCapture

InputCapture

InterProcessCommunication

InterProcessCommunication

LateralToolTransfer

النقل الجانبي لTool

ManInTheMiddle

ManInTheMiddle

Masquerading

يتنكر

ModifyAuthenticationProcess

ModifyAuthenticationProcess

ModifyRegistry

تعديل التسجيل

NetworkDenialOfService

NetworkDenialOfService

NetworkServiceScanning

NetworkServiceScanning

NetworkSniffing

التعرف على الشبكات

NonApplicationLayerProtocol

NonApplicationLayerProtocol

NonStandardPort

NonStandardPort

ObfuscatedFilesOrInformation

ObfuscatedFilesOrInformation

ObtainCapabilities

الحصول على قدرات

OfficeApplicationStartup

OfficeApplicationStartup

OSCredentialDumping

OSCredentialDumping

PermissionGroupsDiscovery

PermissionGroupsDiscovery

Phishing

التصيد الاحتيالي

PreOSBoot

PreOSBoot

ProcessDiscovery

ProcessDiscovery

ProcessInjection

إخراج العملية

ProtocolTunneling

بروتوكول Tunneling

Proxy

الوكيل

QueryRegistry

QueryRegistry

RemoteAccessSoftware

RemoteAccessSoftware

RemoteServices

الخدمات البعيدة

RemoteServiceSessionHijacking

RemoteServiceSessionHijacking

RemoteSystemDiscovery

RemoteSystemDiscovery

ResourceHijacking

سرقة الموارد

ScheduledTaskJob

ScheduledTaskJob

ScreenCapture

لقطة شاشة

SearchVictimOwnedWebsites

SearchVictimOwnedWebsites

ServerSoftwareComponent

ServerSoftwareComponent

ServiceStop

ServiceStop

SignedBinaryProxyExecution

SignedBinaryProxyExecution

SoftwareDeploymentTools

قوالب توزيع البرامج

SQLStoredProcedures

SQLStoredProcedures

StealOrForgeKerberosTickets

StealOrForgeKerberosTickets

SubvertTrustControls

SubvertTrustControls

SupplyChainCompromise

SupplyChainCompromise

SystemInformationDiscovery

SystemInformationDiscovery

TaintSharedContent

TaintSharedContent

TrafficSignaling

محاذاة نسبة استخدام الشبكة

TransferDataToCloudAccount

TransferDataToCloudAccount

TrustedRelationship

علاقة موثوق بها

UnsecuredCredentials

بيانات اعتماد غير آمنة

UserExecution

UserExecution

ValidAccounts

حسابات صالحة

WindowsManagementInstrumentation

WindowsManagementInstrumentation