Network Matrix

Below are the tactics and techniques representing the MITRE ATT&CK® Network platform. The techniques below are known to target network devices such as routers, switches, and load balancers. The Matrix contains information for the Network platform.

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
2 techniques 2 techniques 10 techniques 4 techniques 11 techniques 6 techniques 11 techniques 1 techniques 4 techniques 7 techniques 2 techniques 4 techniques
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
2 techniques 2 techniques 10 techniques 4 techniques 11 techniques 6 techniques 11 techniques 1 techniques 4 techniques 7 techniques 2 techniques 4 techniques