Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1119 | Automated Collection |
PACEMAKER can enter a loop to read |
|
Enterprise | T1059 | .004 | Command and Scripting Interpreter: Unix Shell | |
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
PACEMAKER has written extracted data to |
Enterprise | T1083 | File and Directory Discovery |
PACEMAKER can parse |
|
Enterprise | T1003 | .007 | OS Credential Dumping: Proc Filesystem |
PACEMAKER has the ability to extract credentials from OS memory.[1] |
Enterprise | T1055 | .008 | Process Injection: Ptrace System Calls |
PACEMAKER can use PTRACE to attach to a targeted process to read process memory.[1] |