Linux Technique Matrix

From enterprise
Jump to: navigation, search
Initial Access Drive-by CompromiseExploit Public-Facing ApplicationHardware AdditionsSpearphishing AttachmentSpearphishing LinkSpearphishing via ServiceSupply Chain CompromiseTrusted RelationshipValid Accounts
Execution Command-Line InterfaceExploitation for Client ExecutionGraphical User InterfaceLocal Job SchedulingScriptingSourceSpace after FilenameThird-party SoftwareTrapUser Execution
Persistence .bash_profile and .bashrcBootkitBrowser ExtensionsCreate AccountHidden Files and DirectoriesKernel Modules and ExtensionsLocal Job SchedulingPort KnockingRedundant AccessTrapValid AccountsWeb Shell
Privilege Escalation Exploitation for Privilege EscalationProcess InjectionSetuid and SetgidSudoSudo CachingValid AccountsWeb Shell
Defense Evasion Binary PaddingClear Command HistoryDisabling Security ToolsExploitation for Defense EvasionFile DeletionHISTCONTROLHidden Files and DirectoriesIndicator Removal from ToolsIndicator Removal on HostInstall Root CertificateMasqueradingObfuscated Files or InformationPort KnockingProcess InjectionRedundant AccessRootkitScriptingSpace after FilenameTimestompValid AccountsWeb Service
Credential Access Bash HistoryBrute ForceCredentials in FilesExploitation for Credential AccessInput CaptureNetwork SniffingPrivate KeysTwo-Factor Authentication Interception
Discovery Account DiscoveryBrowser Bookmark DiscoveryFile and Directory DiscoveryNetwork Service ScanningPassword Policy DiscoveryPermission Groups DiscoveryProcess DiscoveryRemote System DiscoverySystem Information DiscoverySystem Network Configuration DiscoverySystem Network Connections DiscoverySystem Owner/User Discovery
Lateral Movement Application Deployment SoftwareExploitation of Remote ServicesRemote File CopyRemote ServicesSSH HijackingThird-party Software
Collection Audio CaptureAutomated CollectionClipboard DataData StagedData from Information RepositoriesData from Local SystemData from Network Shared DriveData from Removable MediaInput CaptureScreen Capture
Exfiltration Automated ExfiltrationData CompressedData EncryptedData Transfer Size LimitsExfiltration Over Alternative ProtocolExfiltration Over Command and Control ChannelExfiltration Over Other Network MediumExfiltration Over Physical MediumScheduled Transfer
Command and Control Commonly Used PortCommunication Through Removable MediaConnection ProxyCustom Command and Control ProtocolCustom Cryptographic ProtocolData EncodingData ObfuscationDomain FrontingFallback ChannelsMulti-Stage ChannelsMulti-hop ProxyMultiband CommunicationMultilayer EncryptionPort KnockingRemote Access ToolsRemote File CopyStandard Application Layer ProtocolStandard Cryptographic ProtocolStandard Non-Application Layer ProtocolUncommonly Used PortWeb Service