Techniques 列挙型

評価の手法。

継承
builtins.str
Techniques
Techniques

コンストラクター

Techniques(value, names=None, *, module=None, qualname=None, type=None, start=1, boundary=None)

フィールド

ABUSE_ELEVATION_CONTROL_MECHANISM
ACCESS_TOKEN_MANIPULATION
ACCOUNT_DISCOVERY
ACCOUNT_MANIPULATION
ACTIVE_SCANNING
APPLICATION_LAYER_PROTOCOL
AUDIO_CAPTURE
BOOT_OR_LOGON_AUTOSTART_EXECUTION
BOOT_OR_LOGON_INITIALIZATION_SCRIPTS
BRUTE_FORCE
CLOUD_INFRASTRUCTURE_DISCOVERY
CLOUD_SERVICE_DASHBOARD
CLOUD_SERVICE_DISCOVERY
COMMAND_AND_SCRIPTING_INTERPRETER
COMPROMISE_CLIENT_SOFTWARE_BINARY
COMPROMISE_INFRASTRUCTURE
CONTAINER_AND_RESOURCE_DISCOVERY
CREATE_ACCOUNT
CREATE_OR_MODIFY_SYSTEM_PROCESS
CREDENTIALS_FROM_PASSWORD_STORES
DATA_DESTRUCTION
DATA_ENCRYPTED_FOR_IMPACT
DATA_FROM_CLOUD_STORAGE_OBJECT
DATA_FROM_CONFIGURATION_REPOSITORY
DATA_FROM_INFORMATION_REPOSITORIES
DATA_FROM_LOCAL_SYSTEM
DATA_MANIPULATION
DATA_STAGED
DEFACEMENT
DEOBFUSCATE_DECODE_FILES_OR_INFORMATION
DISK_WIPE
DOMAIN_TRUST_DISCOVERY
DRIVE_BY_COMPROMISE
DYNAMIC_RESOLUTION
ENDPOINT_DENIAL_OF_SERVICE
EVENT_TRIGGERED_EXECUTION
EXFILTRATION_OVER_ALTERNATIVE_PROTOCOL
EXPLOITATION_FOR_CLIENT_EXECUTION
EXPLOITATION_FOR_CREDENTIAL_ACCESS
EXPLOITATION_FOR_DEFENSE_EVASION
EXPLOITATION_FOR_PRIVILEGE_ESCALATION
EXPLOITATION_OF_REMOTE_SERVICES
EXPLOIT_PUBLIC_FACING_APPLICATION
EXTERNAL_REMOTE_SERVICES
FALLBACK_CHANNELS
FILE_AND_DIRECTORY_DISCOVERY
FILE_AND_DIRECTORY_PERMISSIONS_MODIFICATION
GATHER_VICTIM_NETWORK_INFORMATION
HIDE_ARTIFACTS
HIJACK_EXECUTION_FLOW
IMPAIR_DEFENSES
IMPLANT_CONTAINER_IMAGE
INDICATOR_REMOVAL_ON_HOST
INDIRECT_COMMAND_EXECUTION
INGRESS_TOOL_TRANSFER
INPUT_CAPTURE
INTER_PROCESS_COMMUNICATION
LATERAL_TOOL_TRANSFER
MAN_IN_THE_MIDDLE
MASQUERADING
MODIFY_AUTHENTICATION_PROCESS
MODIFY_REGISTRY
NETWORK_DENIAL_OF_SERVICE
NETWORK_SERVICE_SCANNING
NETWORK_SNIFFING
NON_APPLICATION_LAYER_PROTOCOL
NON_STANDARD_PORT
OBFUSCATED_FILES_OR_INFORMATION
OBTAIN_CAPABILITIES
OFFICE_APPLICATION_STARTUP
OS_CREDENTIAL_DUMPING
PERMISSION_GROUPS_DISCOVERY
PHISHING
PRE_OS_BOOT
PROCESS_DISCOVERY
PROCESS_INJECTION
PROTOCOL_TUNNELING
PROXY
QUERY_REGISTRY
REMOTE_ACCESS_SOFTWARE
REMOTE_SERVICES
REMOTE_SERVICE_SESSION_HIJACKING
REMOTE_SYSTEM_DISCOVERY
RESOURCE_HIJACKING
SCHEDULED_TASK_JOB
SCREEN_CAPTURE
SEARCH_VICTIM_OWNED_WEBSITES
SERVER_SOFTWARE_COMPONENT
SERVICE_STOP
SIGNED_BINARY_PROXY_EXECUTION
SOFTWARE_DEPLOYMENT_TOOLS
SQL_STORED_PROCEDURES
STEAL_OR_FORGE_KERBEROS_TICKETS
SUBVERT_TRUST_CONTROLS
SUPPLY_CHAIN_COMPROMISE
SYSTEM_INFORMATION_DISCOVERY
TAINT_SHARED_CONTENT
TRAFFIC_SIGNALING
TRANSFER_DATA_TO_CLOUD_ACCOUNT
TRUSTED_RELATIONSHIP
UNSECURED_CREDENTIALS
USER_EXECUTION
VALID_ACCOUNTS
WINDOWS_MANAGEMENT_INSTRUMENTATION