Compartilhar via


KnownTechniques enum

Valores conhecidos de técnicas de que o serviço aceita.

Campos

AbuseElevationControlMechanism

Mecanismo de AbusoElevationControl

AccessTokenManipulation

AccessTokenManipulation

AccountDiscovery

Descoberta de conta

AccountManipulation

Manipulação de conta

ActiveScanning

ActiveScanning

ApplicationLayerProtocol

Protocolo de Camada de Aplicação

AudioCapture

Captura de áudio

BootOrLogonAutostartExecution

BootOrLogonAutostartExecution

BootOrLogonInitializationScripts

BootOrLogonInitializationScripts

BruteForce

Força Bruta

CloudInfrastructureDiscovery

CloudInfrastructureDiscovery

CloudServiceDashboard

CloudServiceDashboard

CloudServiceDiscovery

CloudServiceDiscovery

CommandAndScriptingInterpreter

Interpretador CommandAndScriptingInterpreter

CompromiseClientSoftwareBinary

CompromissoClienteSoftwareBinário

CompromiseInfrastructure

CompromiseInfrastructure

ContainerAndResourceDiscovery

ContainerAndResourceDiscovery

CreateAccount

CreateAccount

CreateOrModifySystemProcess

CreateOrModifySystemProcess

CredentialsFromPasswordStores

CredentialsFromPasswordStores

DataDestruction

Destruição de dados

DataEncryptedForImpact

DataEncryptedForImpact

DataFromCloudStorageObject

DataFromCloudStorageObject

DataFromConfigurationRepository

DataFromConfigurationRepository

DataFromInformationRepositories

Repositórios DataFromInformationRepositories

DataFromLocalSystem

DataFromLocalSystem

DataManipulation

Manipulação de dados

DataStaged

DataStaged

Defacement

Desfiguração

DeobfuscateDecodeFilesOrInformation

DesofuscaçãoDecodeFilesOrInformation

DiskWipe

Limpeza de disco

DomainTrustDiscovery

DomainTrustDiscovery

DriveByCompromise

DriveByCompromise

DynamicResolution

Resolução Dinâmica

EndpointDenialOfService

EndpointDenialOfService

EventTriggeredExecution

Execução acionada por eventos

ExfiltrationOverAlternativeProtocol

ExfiltraçãoOverAlternativeProtocol

ExploitationForClientExecution

ExploraçãoParaClientExecution

ExploitationForCredentialAccess

ExploitationForCredentialAccess

ExploitationForDefenseEvasion

ExploraçãoParaEvasão de Defesa

ExploitationForPrivilegeEscalation

ExploitationForPrivilegeEscalation

ExploitationOfRemoteServices

ExploraçãoDeRemoteServices

ExploitPublicFacingApplication

ExploitPublicFacingApplication

ExternalRemoteServices

Serviços Remotos Externos

FallbackChannels

Canais de fallback

FileAndDirectoryDiscovery

FileAndDirectoryDiscovery

FileAndDirectoryPermissionsModification

FileAndDirectoryPermissionsModification

GatherVictimNetworkInformation

GatherVictimNetworkInformation

HideArtifacts

Artefatos de Ocultação

HijackExecutionFlow

Fluxo de execução de seqüestro

ImpairDefenses

Defesas Prejudicadas

ImplantContainerImage

Imagem do ImplantContainer

IndicatorRemovalOnHost

IndicatorRemovalOnHost

IndirectCommandExecution

Execução de Comando Indireto

IngressToolTransfer

Transferência de ferramentas de entrada

InputCapture

Captura de entrada

InterProcessCommunication

Comunicação InterProcesso

LateralToolTransfer

LateralToolTransfer

ManInTheMiddle

HomemNoMeio

Masquerading

Masquerading

ModifyAuthenticationProcess

Processo de Modificação de Autenticação

ModifyRegistry

Modificar Registro

NetworkDenialOfService

NetworkDenialOfService

NetworkServiceScanning

NetworkServiceScanning

NetworkSniffing

Detecção de rede

NonApplicationLayerProtocol

Protocolo NonApplicationLayer

NonStandardPort

Porta não padrão

ObfuscatedFilesOrInformation

ObfuscatedFilesOrInformation

ObtainCapabilities

Obter recursos

OfficeApplicationStartup

OfficeApplicationStartup

OSCredentialDumping

OSCredentialDumping

PermissionGroupsDiscovery

PermissionGroupsDiscovery

Phishing

Phishing

PreOSBoot

PreOSBoot

ProcessDiscovery

Descoberta de processos

ProcessInjection

Injeção de processo

ProtocolTunneling

ProtocolTunneling

Proxy

Proxy

QueryRegistry

QueryRegistry

RemoteAccessSoftware

Software de acesso remoto

RemoteServices

Serviços remotos

RemoteServiceSessionHijacking

RemoteServiceSessionHijacking

RemoteSystemDiscovery

Descoberta do Sistema Remoto

ResourceHijacking

Sequestro de recursos

ScheduledTaskJob

ScheduledTaskJob

ScreenCapture

ScreenCapture

SearchVictimOwnedWebsites

SearchVictimOwnedWebsites

ServerSoftwareComponent

Componente de software de servidor

ServiceStop

Parada de serviço

SignedBinaryProxyExecution

Execução de proxy binário assinado

SoftwareDeploymentTools

SoftwareDeploymentTools

SQLStoredProcedures

SQLStoredProcedures

StealOrForgeKerberosTickets

StealOrForgeKerberosTickets

SubvertTrustControls

SubvertTrustControls

SupplyChainCompromise

Comprometimento da cadeia de suprimentos

SystemInformationDiscovery

SystemInformationDiscovery

TaintSharedContent

TaintSharedContent

TrafficSignaling

Sinalização de tráfego

TransferDataToCloudAccount

TransferDataToCloudAccount

TrustedRelationship

Relacionamento Confiável

UnsecuredCredentials

Credenciais não seguras

UserExecution

UserExecution

ValidAccounts

Contas válidas

WindowsManagementInstrumentation

WindowsManagementInstrumentation