
Execution, Tactic TA0104 - ICS | MITRE ATT&CK®
Oct 17, 2018 · Execution consists of techniques that result in adversary-controlled code running on a local or remote system, device, or other asset. This execution may also rely on …
User Execution: Malicious File, Sub-technique T1204.002
An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution.
Command and Scripting Interpreter - MITRE ATT&CK®
Oct 24, 2018 · Adversaries may also execute commands through interactive terminals/shells, as well as utilize various Remote Services in order to achieve remote Execution. [1] [2] [3]
Exploitation for Client Execution - MITRE ATT&CK®
Exploitation for Client Execution Adversaries may exploit software vulnerabilities in client applications to execute code. Vulnerabilities can exist in software due to unsecure coding …
Hijack Execution Flow: Dynamic Linker Hijacking - MITRE ATT&CK®
During the execution preparation phase of a program, the dynamic linker loads specified absolute paths of shared libraries from various environment variables and files, such as LD_PRELOAD …
System Services, Technique T1569 - Enterprise | MITRE ATT&CK®
Adversaries can execute malicious content by interacting with or creating services either locally or remotely. Many services are set to run at boot, which can aid in achieving persistence (Create …
Execution, Tactic TA0002 - Enterprise | MITRE ATT&CK®
Oct 17, 2018 · Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with …
Process Injection: Thread Execution Hijacking, Sub-technique …
Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via Thread Execution …
Command and Scripting Interpreter: - MITRE ATT&CK®
Jul 16, 2018 · Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment …
Deploy Container, Technique T1610 - Enterprise | MITRE ATT&CK®
Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute processes associated with …