Research visibility gap of security vendors

From pre-attack
Jump to: navigation, search


Research visibility gap of security vendors
Technique
ID PRE-T1067
Tactic Technical Weakness Identification

Definition

If an adversary can identify which security tools a victim is using they may be able to identify ways around those tools.1

Difficulty for the Adversary

Easy for the Adversary (Yes/No): No

Explanation: Requires in-depth research and potentially other intrusions, requires unbounded amount of work to possibly find a return on investment

Detection

Detectable by Common Defenses (Yes/No/Partial): No

Explanation: Public source external to the defender's organization.