KnownTechniques enum
القيم المعروفة للتقنيات التي تقبلها الخدمة.
الحقول
| AbuseElevationControlMechanism | AbuseElevationControlMechanism |
| AccessTokenManipulation | AccessTokenManipulation |
| AccountDiscovery | AccountDiscovery |
| AccountManipulation | إدارة الحساب |
| ActiveScanning | ActiveScanning |
| ApplicationLayerProtocol | ApplicationLayerProtocol |
| AudioCapture | صورة صوتية |
| BootOrLogonAutostartExecution | BootOrLogonAutostartExecution |
| BootOrLogonInitializationScripts | BootOrLogonInitializationScripts |
| BruteForce | BruteForce |
| CloudInfrastructureDiscovery | CloudInfrastructureDiscovery |
| CloudServiceDashboard | CloudServiceDashboard |
| CloudServiceDiscovery | CloudServiceDiscovery |
| CommandAndScriptingInterpreter | CommandAndScriptingInterpreter |
| CompromiseClientSoftwareBinary | CompromiseClientSoftwareBinary |
| CompromiseInfrastructure | البنية الأساسية ل CompromiseInfrastructure |
| ContainerAndResourceDiscovery | ContainerAndResourceDiscovery |
| CreateAccount | CreateAccount |
| CreateOrModifySystemProcess | CreateOrModifySystemProcess |
| CredentialsFromPasswordStores | CredentialsFromPasswordStores |
| DataDestruction | شفط البيانات |
| DataEncryptedForImpact | DataEncryptedForImpact |
| DataFromCloudStorageObject | DataFromCloudStorageObject |
| DataFromConfigurationRepository | DataFromConfigurationRepository |
| DataFromInformationRepositories | DataFromInformationRepositories |
| DataFromLocalSystem | DataFromLocalSystem |
| DataManipulation | إدارة البيانات |
| DataStaged | DataStaged |
| Defacement | تشويه |
| DeobfuscateDecodeFilesOrInformation | DeobfuscateDecodeFilesOrInformation |
| DiskWipe | DiskWipe |
| DomainTrustDiscovery | DomainTrustDiscovery |
| DriveByCompromise | DriveByCompromise |
| DynamicResolution | DynamicResolution |
| EndpointDenialOfService | EndpointDenialOfService |
| EventTriggeredExecution | EventTriggeredExecution |
| ExfiltrationOverAlternativeProtocol | ExfiltrationOverAlternativeProtocol |
| ExploitationForClientExecution | الاستغلالForClientExecution |
| ExploitationForCredentialAccess | ExploitationForCredentialAccess |
| ExploitationForDefenseEvasion | ExploitationForDefenseEvasion |
| ExploitationForPrivilegeEscalation | ExploitationForPrivilegeEscalation |
| ExploitationOfRemoteServices | ExploitationOfRemoteServices |
| ExploitPublicFacingApplication | ExploitPublicFacingApplication |
| ExternalRemoteServices | ExternalRemoteServices |
| FallbackChannels | القنوات الاحتياطية |
| FileAndDirectoryDiscovery | FileAndDirectoryDiscovery |
| FileAndDirectoryPermissionsModification | FileAndDirectoryPermissionsModification |
| GatherVictimNetworkInformation | معلومات تجميع معلومات الشبكة |
| HideArtifacts | HideArtifacts |
| HijackExecutionFlow | HijackExecutionFlow |
| ImpairDefenses | ضعف الدفاعات |
| ImplantContainerImage | صورة زراعة الزرع |
| IndicatorRemovalOnHost | IndicatorRemovalOnHost |
| IndirectCommandExecution | IndirectCommandExecution |
| IngressToolTransfer | IngressToolTransfer |
| InputCapture | InputCapture |
| InterProcessCommunication | InterProcessCommunication |
| LateralToolTransfer | النقل الجانبي لTool |
| ManInTheMiddle | ManInTheMiddle |
| Masquerading | يتنكر |
| ModifyAuthenticationProcess | ModifyAuthenticationProcess |
| ModifyRegistry | تعديل التسجيل |
| NetworkDenialOfService | NetworkDenialOfService |
| NetworkServiceScanning | NetworkServiceScanning |
| NetworkSniffing | التعرف على الشبكات |
| NonApplicationLayerProtocol | NonApplicationLayerProtocol |
| NonStandardPort | NonStandardPort |
| ObfuscatedFilesOrInformation | ObfuscatedFilesOrInformation |
| ObtainCapabilities | الحصول على قدرات |
| OfficeApplicationStartup | OfficeApplicationStartup |
| OSCredentialDumping | OSCredentialDumping |
| PermissionGroupsDiscovery | PermissionGroupsDiscovery |
| Phishing | التصيد الاحتيالي |
| PreOSBoot | PreOSBoot |
| ProcessDiscovery | ProcessDiscovery |
| ProcessInjection | إخراج العملية |
| ProtocolTunneling | بروتوكول Tunneling |
| Proxy | الوكيل |
| QueryRegistry | QueryRegistry |
| RemoteAccessSoftware | RemoteAccessSoftware |
| RemoteServices | الخدمات البعيدة |
| RemoteServiceSessionHijacking | RemoteServiceSessionHijacking |
| RemoteSystemDiscovery | RemoteSystemDiscovery |
| ResourceHijacking | سرقة الموارد |
| ScheduledTaskJob | ScheduledTaskJob |
| ScreenCapture | لقطة شاشة |
| SearchVictimOwnedWebsites | SearchVictimOwnedWebsites |
| ServerSoftwareComponent | ServerSoftwareComponent |
| ServiceStop | ServiceStop |
| SignedBinaryProxyExecution | SignedBinaryProxyExecution |
| SoftwareDeploymentTools | قوالب توزيع البرامج |
| SQLStoredProcedures | SQLStoredProcedures |
| StealOrForgeKerberosTickets | StealOrForgeKerberosTickets |
| SubvertTrustControls | SubvertTrustControls |
| SupplyChainCompromise | SupplyChainCompromise |
| SystemInformationDiscovery | SystemInformationDiscovery |
| TaintSharedContent | TaintSharedContent |
| TrafficSignaling | محاذاة نسبة استخدام الشبكة |
| TransferDataToCloudAccount | TransferDataToCloudAccount |
| TrustedRelationship | علاقة موثوق بها |
| UnsecuredCredentials | بيانات اعتماد غير آمنة |
| UserExecution | UserExecution |
| ValidAccounts | حسابات صالحة |
| WindowsManagementInstrumentation | WindowsManagementInstrumentation |