Common Tactics
Last updated
Last updated
There are a bunch of tactics we can found in . The following are some of the examples.
Initial Access Tactic (TA0001)
techniques and strategies to breach an organisation
focus on delivering payload to target system or network
to gain a foothold in the network
Social Engineering techniques such as phishing.
Exploiting vulnerabilities through public-facing servers.
Spraying credentials through exposed authentication endpoints.
Executing commands through malicious flash drives.
Installing cracked software with hidden malicious code.
account access via valid credentials
machine access via RCE
intrusion attempts
signs of method mentioned above
Execution through built-in system tools or using .