Network Matrix

Below are the tactics and techniques representing the MITRE ATT&CK® Matrix for Enterprise covering techniques against network infrastructure devices. The Matrix contains information for the Network platform.

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Collection Command and Control Exfiltration Impact
2 techniques 1 techniques 5 techniques 1 techniques 9 techniques 5 techniques 8 techniques 4 techniques 3 techniques 1 techniques 2 techniques
Last modified: 01 April 2022
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Collection Command and Control Exfiltration Impact
2 techniques 1 techniques 5 techniques 1 techniques 9 techniques 5 techniques 8 techniques 4 techniques 3 techniques 1 techniques 2 techniques
Last modified: 01 April 2022