Defense Evasion

GPTKB entity

Statements (70)
Predicate Object
gptkbp:instanceOf MITRE ATT&CK tactic
gptkbp:describes Techniques that adversaries use to avoid detection throughout their compromise.
https://www.w3.org/2000/01/rdf-schema#label Defense Evasion
gptkbp:partOf gptkb:MITRE_ATT&CK_framework
gptkbp:technique gptkb:Abuse_Elevation_Control_Mechanism
gptkb:Boot_or_Logon_Autostart_Execution
gptkb:Boot_or_Logon_Initialization_Scripts
gptkb:Hidden_Files_and_Directories
gptkb:Hijack_Execution_Flow
gptkb:Impair_Defenses
gptkb:Obfuscated_Files_or_Information
gptkb:Process_Injection
gptkb:Signed_Binary_Proxy_Execution
gptkb:Subvert_Trust_Controls
Impersonation
Bypass User Account Control
Rootkit
Access Token Manipulation
Clear Windows Event Logs
Compromise Client Software Binary
Compromise Infrastructure
Deobfuscate/Decode Files or Information
Disable or Modify Tools
File and Directory Permissions Modification
Indicator Removal on Host
Indirect Command Execution
Install Root Certificate
Masquerading
Modify Authentication Process
Modify Cloud Compute Infrastructure
Modify Cloud Compute Service
Modify Cloud Firewall Rules
Modify Cloud Identity and Access Management
Modify Cloud Key Management Service
Modify Cloud Logging Configuration
Modify Cloud Monitoring Configuration
Modify Cloud Network Configuration
Modify Cloud Resource Policies
Modify Cloud Security Groups
Modify Cloud Service API Keys
Modify Cloud Service API Permissions
Modify Cloud Service Access Keys
Modify Cloud Service Account
Modify Cloud Service Certificates
Modify Cloud Service Configuration
Modify Cloud Service Credentials
Modify Cloud Service Encryption Keys
Modify Cloud Service Firewall Rules
Modify Cloud Service Key Management Service
Modify Cloud Service Logging Configuration
Modify Cloud Service Monitoring Configuration
Modify Cloud Service Permissions
Modify Cloud Service Resource Policies
Modify Cloud Service Role
Modify Cloud Service Secrets
Modify Cloud Service Security Groups
Modify Cloud Service Security Policies
Modify Cloud Service Trust Policy
Modify Cloud Storage
Modify Registry
Modify System Image
Network Boundary Bridging
Parent PID Spoofing
Plist Modification
Service Registry Permissions Weakness
Timestomp
Valid Accounts
Virtualization/Sandbox Evasion
gptkbp:bfsParent gptkb:MITRE_ATT&CK
gptkbp:bfsLayer 6