Network Matrix

Below are the tactics and techniques representing the MITRE ATT&CK® Matrix for Enterprise covering techniques against network infrastructure devices. The Matrix contains information for the Network platform.

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
2 techniques 2 techniques 8 techniques 2 techniques 9 techniques 6 techniques 11 techniques 1 techniques 4 techniques 3 techniques 2 techniques 4 techniques
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
2 techniques 2 techniques 8 techniques 2 techniques 9 techniques 6 techniques 11 techniques 1 techniques 4 techniques 3 techniques 2 techniques 4 techniques