Techniques 列挙型
評価の手法。
- 継承
-
builtins.strTechniquesTechniques
コンストラクター
Techniques(value, names=None, *, module=None, qualname=None, type=None, start=1, boundary=None)
フィールド
| ABUSE_ELEVATION_CONTROL_MECHANISM |
| ACCESS_TOKEN_MANIPULATION |
| ACCOUNT_DISCOVERY |
| ACCOUNT_MANIPULATION |
| ACTIVE_SCANNING |
| APPLICATION_LAYER_PROTOCOL |
| AUDIO_CAPTURE |
| BOOT_OR_LOGON_AUTOSTART_EXECUTION |
| BOOT_OR_LOGON_INITIALIZATION_SCRIPTS |
| BRUTE_FORCE |
| CLOUD_INFRASTRUCTURE_DISCOVERY |
| CLOUD_SERVICE_DASHBOARD |
| CLOUD_SERVICE_DISCOVERY |
| COMMAND_AND_SCRIPTING_INTERPRETER |
| COMPROMISE_CLIENT_SOFTWARE_BINARY |
| COMPROMISE_INFRASTRUCTURE |
| CONTAINER_AND_RESOURCE_DISCOVERY |
| CREATE_ACCOUNT |
| CREATE_OR_MODIFY_SYSTEM_PROCESS |
| CREDENTIALS_FROM_PASSWORD_STORES |
| DATA_DESTRUCTION |
| DATA_ENCRYPTED_FOR_IMPACT |
| DATA_FROM_CLOUD_STORAGE_OBJECT |
| DATA_FROM_CONFIGURATION_REPOSITORY |
| DATA_FROM_INFORMATION_REPOSITORIES |
| DATA_FROM_LOCAL_SYSTEM |
| DATA_MANIPULATION |
| DATA_STAGED |
| DEFACEMENT |
| DEOBFUSCATE_DECODE_FILES_OR_INFORMATION |
| DISK_WIPE |
| DOMAIN_TRUST_DISCOVERY |
| DRIVE_BY_COMPROMISE |
| DYNAMIC_RESOLUTION |
| ENDPOINT_DENIAL_OF_SERVICE |
| EVENT_TRIGGERED_EXECUTION |
| EXFILTRATION_OVER_ALTERNATIVE_PROTOCOL |
| EXPLOITATION_FOR_CLIENT_EXECUTION |
| EXPLOITATION_FOR_CREDENTIAL_ACCESS |
| EXPLOITATION_FOR_DEFENSE_EVASION |
| EXPLOITATION_FOR_PRIVILEGE_ESCALATION |
| EXPLOITATION_OF_REMOTE_SERVICES |
| EXPLOIT_PUBLIC_FACING_APPLICATION |
| EXTERNAL_REMOTE_SERVICES |
| FALLBACK_CHANNELS |
| FILE_AND_DIRECTORY_DISCOVERY |
| FILE_AND_DIRECTORY_PERMISSIONS_MODIFICATION |
| GATHER_VICTIM_NETWORK_INFORMATION |
| HIDE_ARTIFACTS |
| HIJACK_EXECUTION_FLOW |
| IMPAIR_DEFENSES |
| IMPLANT_CONTAINER_IMAGE |
| INDICATOR_REMOVAL_ON_HOST |
| INDIRECT_COMMAND_EXECUTION |
| INGRESS_TOOL_TRANSFER |
| INPUT_CAPTURE |
| INTER_PROCESS_COMMUNICATION |
| LATERAL_TOOL_TRANSFER |
| MAN_IN_THE_MIDDLE |
| MASQUERADING |
| MODIFY_AUTHENTICATION_PROCESS |
| MODIFY_REGISTRY |
| NETWORK_DENIAL_OF_SERVICE |
| NETWORK_SERVICE_SCANNING |
| NETWORK_SNIFFING |
| NON_APPLICATION_LAYER_PROTOCOL |
| NON_STANDARD_PORT |
| OBFUSCATED_FILES_OR_INFORMATION |
| OBTAIN_CAPABILITIES |
| OFFICE_APPLICATION_STARTUP |
| OS_CREDENTIAL_DUMPING |
| PERMISSION_GROUPS_DISCOVERY |
| PHISHING |
| PRE_OS_BOOT |
| PROCESS_DISCOVERY |
| PROCESS_INJECTION |
| PROTOCOL_TUNNELING |
| PROXY |
| QUERY_REGISTRY |
| REMOTE_ACCESS_SOFTWARE |
| REMOTE_SERVICES |
| REMOTE_SERVICE_SESSION_HIJACKING |
| REMOTE_SYSTEM_DISCOVERY |
| RESOURCE_HIJACKING |
| SCHEDULED_TASK_JOB |
| SCREEN_CAPTURE |
| SEARCH_VICTIM_OWNED_WEBSITES |
| SERVER_SOFTWARE_COMPONENT |
| SERVICE_STOP |
| SIGNED_BINARY_PROXY_EXECUTION |
| SOFTWARE_DEPLOYMENT_TOOLS |
| SQL_STORED_PROCEDURES |
| STEAL_OR_FORGE_KERBEROS_TICKETS |
| SUBVERT_TRUST_CONTROLS |
| SUPPLY_CHAIN_COMPROMISE |
| SYSTEM_INFORMATION_DISCOVERY |
| TAINT_SHARED_CONTENT |
| TRAFFIC_SIGNALING |
| TRANSFER_DATA_TO_CLOUD_ACCOUNT |
| TRUSTED_RELATIONSHIP |
| UNSECURED_CREDENTIALS |
| USER_EXECUTION |
| VALID_ACCOUNTS |
| WINDOWS_MANAGEMENT_INSTRUMENTATION |